Nov 23 01:41:12 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Nov 23 01:41:12 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Nov 23 01:41:12 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Nov 23 01:41:12 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 23 01:41:12 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 23 01:41:12 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 23 01:41:12 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 23 01:41:12 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Nov 23 01:41:12 localhost kernel: signal: max sigframe size: 1776 Nov 23 01:41:12 localhost kernel: BIOS-provided physical RAM map: Nov 23 01:41:12 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Nov 23 01:41:12 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Nov 23 01:41:12 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Nov 23 01:41:12 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Nov 23 01:41:12 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Nov 23 01:41:12 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Nov 23 01:41:12 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Nov 23 01:41:12 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Nov 23 01:41:12 localhost kernel: NX (Execute Disable) protection: active Nov 23 01:41:12 localhost kernel: SMBIOS 2.8 present. Nov 23 01:41:12 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Nov 23 01:41:12 localhost kernel: Hypervisor detected: KVM Nov 23 01:41:12 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Nov 23 01:41:12 localhost kernel: kvm-clock: using sched offset of 3280350051 cycles Nov 23 01:41:12 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Nov 23 01:41:12 localhost kernel: tsc: Detected 2799.998 MHz processor Nov 23 01:41:12 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Nov 23 01:41:12 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 23 01:41:12 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Nov 23 01:41:12 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Nov 23 01:41:12 localhost kernel: Using GB pages for direct mapping Nov 23 01:41:12 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Nov 23 01:41:12 localhost kernel: ACPI: Early table checksum verification disabled Nov 23 01:41:12 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Nov 23 01:41:12 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 23 01:41:12 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 23 01:41:12 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 23 01:41:12 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Nov 23 01:41:12 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 23 01:41:12 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 23 01:41:12 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Nov 23 01:41:12 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Nov 23 01:41:12 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Nov 23 01:41:12 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Nov 23 01:41:12 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Nov 23 01:41:12 localhost kernel: No NUMA configuration found Nov 23 01:41:12 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Nov 23 01:41:12 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd3000-0x43fffdfff] Nov 23 01:41:12 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Nov 23 01:41:12 localhost kernel: Zone ranges: Nov 23 01:41:12 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 23 01:41:12 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Nov 23 01:41:12 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Nov 23 01:41:12 localhost kernel: Device empty Nov 23 01:41:12 localhost kernel: Movable zone start for each node Nov 23 01:41:12 localhost kernel: Early memory node ranges Nov 23 01:41:12 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Nov 23 01:41:12 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Nov 23 01:41:12 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Nov 23 01:41:12 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Nov 23 01:41:12 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Nov 23 01:41:12 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Nov 23 01:41:12 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Nov 23 01:41:12 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Nov 23 01:41:12 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Nov 23 01:41:12 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Nov 23 01:41:12 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Nov 23 01:41:12 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Nov 23 01:41:12 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 23 01:41:12 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Nov 23 01:41:12 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Nov 23 01:41:12 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Nov 23 01:41:12 localhost kernel: TSC deadline timer available Nov 23 01:41:12 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Nov 23 01:41:12 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Nov 23 01:41:12 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Nov 23 01:41:12 localhost kernel: Booting paravirtualized kernel on KVM Nov 23 01:41:12 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Nov 23 01:41:12 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Nov 23 01:41:12 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Nov 23 01:41:12 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Nov 23 01:41:12 localhost kernel: Fallback order for Node 0: 0 Nov 23 01:41:12 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Nov 23 01:41:12 localhost kernel: Policy zone: Normal Nov 23 01:41:12 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Nov 23 01:41:12 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Nov 23 01:41:12 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Nov 23 01:41:12 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Nov 23 01:41:12 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 23 01:41:12 localhost kernel: software IO TLB: area num 8. Nov 23 01:41:12 localhost kernel: Memory: 2826284K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741268K reserved, 0K cma-reserved) Nov 23 01:41:12 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Nov 23 01:41:12 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Nov 23 01:41:12 localhost kernel: ftrace: allocating 44803 entries in 176 pages Nov 23 01:41:12 localhost kernel: ftrace: allocated 176 pages with 3 groups Nov 23 01:41:12 localhost kernel: Dynamic Preempt: voluntary Nov 23 01:41:12 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Nov 23 01:41:12 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Nov 23 01:41:12 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Nov 23 01:41:12 localhost kernel: #011Rude variant of Tasks RCU enabled. Nov 23 01:41:12 localhost kernel: #011Tracing variant of Tasks RCU enabled. Nov 23 01:41:12 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 23 01:41:12 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Nov 23 01:41:12 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Nov 23 01:41:12 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Nov 23 01:41:12 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Nov 23 01:41:12 localhost kernel: random: crng init done (trusting CPU's manufacturer) Nov 23 01:41:12 localhost kernel: Console: colour VGA+ 80x25 Nov 23 01:41:12 localhost kernel: printk: console [tty0] enabled Nov 23 01:41:12 localhost kernel: printk: console [ttyS0] enabled Nov 23 01:41:12 localhost kernel: ACPI: Core revision 20211217 Nov 23 01:41:12 localhost kernel: APIC: Switch to symmetric I/O mode setup Nov 23 01:41:12 localhost kernel: x2apic enabled Nov 23 01:41:12 localhost kernel: Switched APIC routing to physical x2apic. Nov 23 01:41:12 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Nov 23 01:41:12 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Nov 23 01:41:12 localhost kernel: pid_max: default: 32768 minimum: 301 Nov 23 01:41:12 localhost kernel: LSM: Security Framework initializing Nov 23 01:41:12 localhost kernel: Yama: becoming mindful. Nov 23 01:41:12 localhost kernel: SELinux: Initializing. Nov 23 01:41:12 localhost kernel: LSM support for eBPF active Nov 23 01:41:12 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 23 01:41:12 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 23 01:41:12 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Nov 23 01:41:12 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Nov 23 01:41:12 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Nov 23 01:41:12 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 23 01:41:12 localhost kernel: Spectre V2 : Mitigation: Retpolines Nov 23 01:41:12 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Nov 23 01:41:12 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Nov 23 01:41:12 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Nov 23 01:41:12 localhost kernel: RETBleed: Mitigation: untrained return thunk Nov 23 01:41:12 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 23 01:41:12 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Nov 23 01:41:12 localhost kernel: Freeing SMP alternatives memory: 36K Nov 23 01:41:12 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Nov 23 01:41:12 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Nov 23 01:41:12 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Nov 23 01:41:12 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Nov 23 01:41:12 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Nov 23 01:41:12 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Nov 23 01:41:12 localhost kernel: ... version: 0 Nov 23 01:41:12 localhost kernel: ... bit width: 48 Nov 23 01:41:12 localhost kernel: ... generic registers: 6 Nov 23 01:41:12 localhost kernel: ... value mask: 0000ffffffffffff Nov 23 01:41:12 localhost kernel: ... max period: 00007fffffffffff Nov 23 01:41:12 localhost kernel: ... fixed-purpose events: 0 Nov 23 01:41:12 localhost kernel: ... event mask: 000000000000003f Nov 23 01:41:12 localhost kernel: rcu: Hierarchical SRCU implementation. Nov 23 01:41:12 localhost kernel: rcu: #011Max phase no-delay instances is 400. Nov 23 01:41:12 localhost kernel: smp: Bringing up secondary CPUs ... Nov 23 01:41:12 localhost kernel: x86: Booting SMP configuration: Nov 23 01:41:12 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Nov 23 01:41:12 localhost kernel: smp: Brought up 1 node, 8 CPUs Nov 23 01:41:12 localhost kernel: smpboot: Max logical packages: 8 Nov 23 01:41:12 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Nov 23 01:41:12 localhost kernel: node 0 deferred pages initialised in 20ms Nov 23 01:41:12 localhost kernel: devtmpfs: initialized Nov 23 01:41:12 localhost kernel: x86/mm: Memory block size: 128MB Nov 23 01:41:12 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 23 01:41:12 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Nov 23 01:41:12 localhost kernel: pinctrl core: initialized pinctrl subsystem Nov 23 01:41:12 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 23 01:41:12 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Nov 23 01:41:12 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Nov 23 01:41:12 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Nov 23 01:41:12 localhost kernel: audit: initializing netlink subsys (disabled) Nov 23 01:41:12 localhost kernel: audit: type=2000 audit(1763880071.624:1): state=initialized audit_enabled=0 res=1 Nov 23 01:41:12 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Nov 23 01:41:12 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 23 01:41:12 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Nov 23 01:41:12 localhost kernel: cpuidle: using governor menu Nov 23 01:41:12 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Nov 23 01:41:12 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 23 01:41:12 localhost kernel: PCI: Using configuration type 1 for base access Nov 23 01:41:12 localhost kernel: PCI: Using configuration type 1 for extended access Nov 23 01:41:12 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Nov 23 01:41:12 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Nov 23 01:41:12 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 23 01:41:12 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 23 01:41:12 localhost kernel: cryptd: max_cpu_qlen set to 1000 Nov 23 01:41:12 localhost kernel: ACPI: Added _OSI(Module Device) Nov 23 01:41:12 localhost kernel: ACPI: Added _OSI(Processor Device) Nov 23 01:41:12 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Nov 23 01:41:12 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 23 01:41:12 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 23 01:41:12 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 23 01:41:12 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 23 01:41:12 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 23 01:41:12 localhost kernel: ACPI: Interpreter enabled Nov 23 01:41:12 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Nov 23 01:41:12 localhost kernel: ACPI: Using IOAPIC for interrupt routing Nov 23 01:41:12 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 23 01:41:12 localhost kernel: PCI: Using E820 reservations for host bridge windows Nov 23 01:41:12 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Nov 23 01:41:12 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Nov 23 01:41:12 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Nov 23 01:41:12 localhost kernel: acpiphp: Slot [3] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [4] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [5] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [6] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [7] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [8] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [9] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [10] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [11] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [12] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [13] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [14] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [15] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [16] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [17] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [18] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [19] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [20] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [21] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [22] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [23] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [24] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [25] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [26] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [27] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [28] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [29] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [30] registered Nov 23 01:41:12 localhost kernel: acpiphp: Slot [31] registered Nov 23 01:41:12 localhost kernel: PCI host bridge to bus 0000:00 Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Nov 23 01:41:12 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Nov 23 01:41:12 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Nov 23 01:41:12 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Nov 23 01:41:12 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Nov 23 01:41:12 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Nov 23 01:41:12 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Nov 23 01:41:12 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Nov 23 01:41:12 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Nov 23 01:41:12 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Nov 23 01:41:12 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Nov 23 01:41:12 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Nov 23 01:41:12 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Nov 23 01:41:12 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Nov 23 01:41:12 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Nov 23 01:41:12 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Nov 23 01:41:12 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Nov 23 01:41:12 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Nov 23 01:41:12 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Nov 23 01:41:12 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Nov 23 01:41:12 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Nov 23 01:41:12 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Nov 23 01:41:12 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Nov 23 01:41:12 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Nov 23 01:41:12 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Nov 23 01:41:12 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Nov 23 01:41:12 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Nov 23 01:41:12 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Nov 23 01:41:12 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Nov 23 01:41:12 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Nov 23 01:41:12 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Nov 23 01:41:12 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Nov 23 01:41:12 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Nov 23 01:41:12 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Nov 23 01:41:12 localhost kernel: iommu: Default domain type: Translated Nov 23 01:41:12 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Nov 23 01:41:12 localhost kernel: SCSI subsystem initialized Nov 23 01:41:12 localhost kernel: ACPI: bus type USB registered Nov 23 01:41:12 localhost kernel: usbcore: registered new interface driver usbfs Nov 23 01:41:12 localhost kernel: usbcore: registered new interface driver hub Nov 23 01:41:12 localhost kernel: usbcore: registered new device driver usb Nov 23 01:41:12 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Nov 23 01:41:12 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 23 01:41:12 localhost kernel: PTP clock support registered Nov 23 01:41:12 localhost kernel: EDAC MC: Ver: 3.0.0 Nov 23 01:41:12 localhost kernel: NetLabel: Initializing Nov 23 01:41:12 localhost kernel: NetLabel: domain hash size = 128 Nov 23 01:41:12 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Nov 23 01:41:12 localhost kernel: NetLabel: unlabeled traffic allowed by default Nov 23 01:41:12 localhost kernel: PCI: Using ACPI for IRQ routing Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Nov 23 01:41:12 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Nov 23 01:41:12 localhost kernel: vgaarb: loaded Nov 23 01:41:12 localhost kernel: clocksource: Switched to clocksource kvm-clock Nov 23 01:41:12 localhost kernel: VFS: Disk quotas dquot_6.6.0 Nov 23 01:41:12 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 23 01:41:12 localhost kernel: pnp: PnP ACPI init Nov 23 01:41:12 localhost kernel: pnp: PnP ACPI: found 5 devices Nov 23 01:41:12 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 23 01:41:12 localhost kernel: NET: Registered PF_INET protocol family Nov 23 01:41:12 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 23 01:41:12 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Nov 23 01:41:12 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 23 01:41:12 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Nov 23 01:41:12 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Nov 23 01:41:12 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Nov 23 01:41:12 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Nov 23 01:41:12 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Nov 23 01:41:12 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Nov 23 01:41:12 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 23 01:41:12 localhost kernel: NET: Registered PF_XDP protocol family Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Nov 23 01:41:12 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Nov 23 01:41:12 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Nov 23 01:41:12 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Nov 23 01:41:12 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Nov 23 01:41:12 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 41310 usecs Nov 23 01:41:12 localhost kernel: PCI: CLS 0 bytes, default 64 Nov 23 01:41:12 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Nov 23 01:41:12 localhost kernel: Trying to unpack rootfs image as initramfs... Nov 23 01:41:12 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Nov 23 01:41:12 localhost kernel: ACPI: bus type thunderbolt registered Nov 23 01:41:12 localhost kernel: Initialise system trusted keyrings Nov 23 01:41:12 localhost kernel: Key type blacklist registered Nov 23 01:41:12 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Nov 23 01:41:12 localhost kernel: zbud: loaded Nov 23 01:41:12 localhost kernel: integrity: Platform Keyring initialized Nov 23 01:41:12 localhost kernel: NET: Registered PF_ALG protocol family Nov 23 01:41:12 localhost kernel: xor: automatically using best checksumming function avx Nov 23 01:41:12 localhost kernel: Key type asymmetric registered Nov 23 01:41:12 localhost kernel: Asymmetric key parser 'x509' registered Nov 23 01:41:12 localhost kernel: Running certificate verification selftests Nov 23 01:41:12 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Nov 23 01:41:12 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Nov 23 01:41:12 localhost kernel: io scheduler mq-deadline registered Nov 23 01:41:12 localhost kernel: io scheduler kyber registered Nov 23 01:41:12 localhost kernel: io scheduler bfq registered Nov 23 01:41:12 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Nov 23 01:41:12 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Nov 23 01:41:12 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Nov 23 01:41:12 localhost kernel: ACPI: button: Power Button [PWRF] Nov 23 01:41:12 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Nov 23 01:41:12 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Nov 23 01:41:12 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Nov 23 01:41:12 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 23 01:41:12 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 23 01:41:12 localhost kernel: Non-volatile memory driver v1.3 Nov 23 01:41:12 localhost kernel: rdac: device handler registered Nov 23 01:41:12 localhost kernel: hp_sw: device handler registered Nov 23 01:41:12 localhost kernel: emc: device handler registered Nov 23 01:41:12 localhost kernel: alua: device handler registered Nov 23 01:41:12 localhost kernel: libphy: Fixed MDIO Bus: probed Nov 23 01:41:12 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Nov 23 01:41:12 localhost kernel: ehci-pci: EHCI PCI platform driver Nov 23 01:41:12 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Nov 23 01:41:12 localhost kernel: ohci-pci: OHCI PCI platform driver Nov 23 01:41:12 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Nov 23 01:41:12 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Nov 23 01:41:12 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Nov 23 01:41:12 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Nov 23 01:41:12 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Nov 23 01:41:12 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Nov 23 01:41:12 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Nov 23 01:41:12 localhost kernel: usb usb1: Product: UHCI Host Controller Nov 23 01:41:12 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Nov 23 01:41:12 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Nov 23 01:41:12 localhost kernel: hub 1-0:1.0: USB hub found Nov 23 01:41:12 localhost kernel: hub 1-0:1.0: 2 ports detected Nov 23 01:41:12 localhost kernel: usbcore: registered new interface driver usbserial_generic Nov 23 01:41:12 localhost kernel: usbserial: USB Serial support registered for generic Nov 23 01:41:12 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Nov 23 01:41:12 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 23 01:41:12 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 23 01:41:12 localhost kernel: mousedev: PS/2 mouse device common for all mice Nov 23 01:41:12 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Nov 23 01:41:12 localhost kernel: rtc_cmos 00:04: registered as rtc0 Nov 23 01:41:12 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Nov 23 01:41:12 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-11-23T06:41:11 UTC (1763880071) Nov 23 01:41:12 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Nov 23 01:41:12 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Nov 23 01:41:12 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Nov 23 01:41:12 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Nov 23 01:41:12 localhost kernel: usbcore: registered new interface driver usbhid Nov 23 01:41:12 localhost kernel: usbhid: USB HID core driver Nov 23 01:41:12 localhost kernel: drop_monitor: Initializing network drop monitor service Nov 23 01:41:12 localhost kernel: Initializing XFRM netlink socket Nov 23 01:41:12 localhost kernel: NET: Registered PF_INET6 protocol family Nov 23 01:41:12 localhost kernel: Segment Routing with IPv6 Nov 23 01:41:12 localhost kernel: NET: Registered PF_PACKET protocol family Nov 23 01:41:12 localhost kernel: mpls_gso: MPLS GSO support Nov 23 01:41:12 localhost kernel: IPI shorthand broadcast: enabled Nov 23 01:41:12 localhost kernel: AVX2 version of gcm_enc/dec engaged. Nov 23 01:41:12 localhost kernel: AES CTR mode by8 optimization enabled Nov 23 01:41:12 localhost kernel: sched_clock: Marking stable (790278791, 182692336)->(1123555151, -150584024) Nov 23 01:41:12 localhost kernel: registered taskstats version 1 Nov 23 01:41:12 localhost kernel: Loading compiled-in X.509 certificates Nov 23 01:41:12 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Nov 23 01:41:12 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Nov 23 01:41:12 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Nov 23 01:41:12 localhost kernel: zswap: loaded using pool lzo/zbud Nov 23 01:41:12 localhost kernel: page_owner is disabled Nov 23 01:41:12 localhost kernel: Key type big_key registered Nov 23 01:41:12 localhost kernel: Freeing initrd memory: 74232K Nov 23 01:41:12 localhost kernel: Key type encrypted registered Nov 23 01:41:12 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Nov 23 01:41:12 localhost kernel: Loading compiled-in module X.509 certificates Nov 23 01:41:12 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Nov 23 01:41:12 localhost kernel: ima: Allocated hash algorithm: sha256 Nov 23 01:41:12 localhost kernel: ima: No architecture policies found Nov 23 01:41:12 localhost kernel: evm: Initialising EVM extended attributes: Nov 23 01:41:12 localhost kernel: evm: security.selinux Nov 23 01:41:12 localhost kernel: evm: security.SMACK64 (disabled) Nov 23 01:41:12 localhost kernel: evm: security.SMACK64EXEC (disabled) Nov 23 01:41:12 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Nov 23 01:41:12 localhost kernel: evm: security.SMACK64MMAP (disabled) Nov 23 01:41:12 localhost kernel: evm: security.apparmor (disabled) Nov 23 01:41:12 localhost kernel: evm: security.ima Nov 23 01:41:12 localhost kernel: evm: security.capability Nov 23 01:41:12 localhost kernel: evm: HMAC attrs: 0x1 Nov 23 01:41:12 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Nov 23 01:41:12 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Nov 23 01:41:12 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Nov 23 01:41:12 localhost kernel: usb 1-1: Product: QEMU USB Tablet Nov 23 01:41:12 localhost kernel: usb 1-1: Manufacturer: QEMU Nov 23 01:41:12 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Nov 23 01:41:12 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Nov 23 01:41:12 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Nov 23 01:41:12 localhost kernel: Freeing unused decrypted memory: 2036K Nov 23 01:41:12 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Nov 23 01:41:12 localhost kernel: Write protecting the kernel read-only data: 26624k Nov 23 01:41:12 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Nov 23 01:41:12 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Nov 23 01:41:12 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Nov 23 01:41:12 localhost kernel: Run /init as init process Nov 23 01:41:12 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 23 01:41:12 localhost systemd[1]: Detected virtualization kvm. Nov 23 01:41:12 localhost systemd[1]: Detected architecture x86-64. Nov 23 01:41:12 localhost systemd[1]: Running in initrd. Nov 23 01:41:12 localhost systemd[1]: No hostname configured, using default hostname. Nov 23 01:41:12 localhost systemd[1]: Hostname set to . Nov 23 01:41:12 localhost systemd[1]: Initializing machine ID from VM UUID. Nov 23 01:41:12 localhost systemd[1]: Queued start job for default target Initrd Default Target. Nov 23 01:41:12 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Nov 23 01:41:12 localhost systemd[1]: Reached target Local Encrypted Volumes. Nov 23 01:41:12 localhost systemd[1]: Reached target Initrd /usr File System. Nov 23 01:41:12 localhost systemd[1]: Reached target Local File Systems. Nov 23 01:41:12 localhost systemd[1]: Reached target Path Units. Nov 23 01:41:12 localhost systemd[1]: Reached target Slice Units. Nov 23 01:41:12 localhost systemd[1]: Reached target Swaps. Nov 23 01:41:12 localhost systemd[1]: Reached target Timer Units. Nov 23 01:41:12 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Nov 23 01:41:12 localhost systemd[1]: Listening on Journal Socket (/dev/log). Nov 23 01:41:12 localhost systemd[1]: Listening on Journal Socket. Nov 23 01:41:12 localhost systemd[1]: Listening on udev Control Socket. Nov 23 01:41:12 localhost systemd[1]: Listening on udev Kernel Socket. Nov 23 01:41:12 localhost systemd[1]: Reached target Socket Units. Nov 23 01:41:12 localhost systemd[1]: Starting Create List of Static Device Nodes... Nov 23 01:41:12 localhost systemd[1]: Starting Journal Service... Nov 23 01:41:12 localhost systemd[1]: Starting Load Kernel Modules... Nov 23 01:41:12 localhost systemd[1]: Starting Create System Users... Nov 23 01:41:12 localhost systemd[1]: Starting Setup Virtual Console... Nov 23 01:41:12 localhost systemd[1]: Finished Create List of Static Device Nodes. Nov 23 01:41:12 localhost systemd[1]: Finished Load Kernel Modules. Nov 23 01:41:12 localhost systemd[1]: Starting Apply Kernel Variables... Nov 23 01:41:12 localhost systemd-journald[283]: Journal started Nov 23 01:41:12 localhost systemd-journald[283]: Runtime Journal (/run/log/journal/5d53608cecc041699dc297e5485943ac) is 8.0M, max 314.7M, 306.7M free. Nov 23 01:41:12 localhost systemd-modules-load[284]: Module 'msr' is built in Nov 23 01:41:12 localhost systemd[1]: Started Journal Service. Nov 23 01:41:12 localhost systemd[1]: Finished Setup Virtual Console. Nov 23 01:41:12 localhost systemd[1]: Finished Apply Kernel Variables. Nov 23 01:41:12 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Nov 23 01:41:12 localhost systemd[1]: Starting dracut cmdline hook... Nov 23 01:41:12 localhost systemd-sysusers[285]: Creating group 'sgx' with GID 997. Nov 23 01:41:12 localhost systemd-sysusers[285]: Creating group 'users' with GID 100. Nov 23 01:41:12 localhost systemd-sysusers[285]: Creating group 'dbus' with GID 81. Nov 23 01:41:12 localhost systemd-sysusers[285]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Nov 23 01:41:12 localhost systemd[1]: Finished Create System Users. Nov 23 01:41:12 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Nov 23 01:41:12 localhost systemd[1]: Starting Create Volatile Files and Directories... Nov 23 01:41:12 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Nov 23 01:41:12 localhost dracut-cmdline[290]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Nov 23 01:41:12 localhost dracut-cmdline[290]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Nov 23 01:41:12 localhost systemd[1]: Finished Create Volatile Files and Directories. Nov 23 01:41:12 localhost systemd[1]: Finished dracut cmdline hook. Nov 23 01:41:12 localhost systemd[1]: Starting dracut pre-udev hook... Nov 23 01:41:12 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 23 01:41:12 localhost kernel: device-mapper: uevent: version 1.0.3 Nov 23 01:41:12 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Nov 23 01:41:12 localhost kernel: RPC: Registered named UNIX socket transport module. Nov 23 01:41:12 localhost kernel: RPC: Registered udp transport module. Nov 23 01:41:12 localhost kernel: RPC: Registered tcp transport module. Nov 23 01:41:12 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Nov 23 01:41:12 localhost rpc.statd[406]: Version 2.5.4 starting Nov 23 01:41:12 localhost rpc.statd[406]: Initializing NSM state Nov 23 01:41:12 localhost rpc.idmapd[411]: Setting log level to 0 Nov 23 01:41:12 localhost systemd[1]: Finished dracut pre-udev hook. Nov 23 01:41:12 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Nov 23 01:41:12 localhost systemd-udevd[424]: Using default interface naming scheme 'rhel-9.0'. Nov 23 01:41:12 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Nov 23 01:41:12 localhost systemd[1]: Starting dracut pre-trigger hook... Nov 23 01:41:12 localhost systemd[1]: Finished dracut pre-trigger hook. Nov 23 01:41:12 localhost systemd[1]: Starting Coldplug All udev Devices... Nov 23 01:41:12 localhost systemd[1]: Finished Coldplug All udev Devices. Nov 23 01:41:12 localhost systemd[1]: Reached target System Initialization. Nov 23 01:41:12 localhost systemd[1]: Reached target Basic System. Nov 23 01:41:12 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Nov 23 01:41:12 localhost systemd[1]: Reached target Network. Nov 23 01:41:12 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Nov 23 01:41:12 localhost systemd[1]: Starting dracut initqueue hook... Nov 23 01:41:12 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Nov 23 01:41:12 localhost kernel: scsi host0: ata_piix Nov 23 01:41:12 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 23 01:41:12 localhost kernel: scsi host1: ata_piix Nov 23 01:41:12 localhost kernel: GPT:20971519 != 838860799 Nov 23 01:41:12 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Nov 23 01:41:12 localhost kernel: GPT:20971519 != 838860799 Nov 23 01:41:12 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Nov 23 01:41:12 localhost kernel: vda: vda1 vda2 vda3 vda4 Nov 23 01:41:12 localhost systemd-udevd[458]: Network interface NamePolicy= disabled on kernel command line. Nov 23 01:41:12 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Nov 23 01:41:12 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Nov 23 01:41:12 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Nov 23 01:41:12 localhost systemd[1]: Reached target Initrd Root Device. Nov 23 01:41:13 localhost kernel: ata1: found unknown device (class 0) Nov 23 01:41:13 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Nov 23 01:41:13 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Nov 23 01:41:13 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Nov 23 01:41:13 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Nov 23 01:41:13 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Nov 23 01:41:13 localhost systemd[1]: Finished dracut initqueue hook. Nov 23 01:41:13 localhost systemd[1]: Reached target Preparation for Remote File Systems. Nov 23 01:41:13 localhost systemd[1]: Reached target Remote Encrypted Volumes. Nov 23 01:41:13 localhost systemd[1]: Reached target Remote File Systems. Nov 23 01:41:13 localhost systemd[1]: Starting dracut pre-mount hook... Nov 23 01:41:13 localhost systemd[1]: Finished dracut pre-mount hook. Nov 23 01:41:13 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Nov 23 01:41:13 localhost systemd-fsck[511]: /usr/sbin/fsck.xfs: XFS file system. Nov 23 01:41:13 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Nov 23 01:41:13 localhost systemd[1]: Mounting /sysroot... Nov 23 01:41:14 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Nov 23 01:41:14 localhost kernel: XFS (vda4): Mounting V5 Filesystem Nov 23 01:41:14 localhost kernel: XFS (vda4): Ending clean mount Nov 23 01:41:14 localhost systemd[1]: Mounted /sysroot. Nov 23 01:41:14 localhost systemd[1]: Reached target Initrd Root File System. Nov 23 01:41:14 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Nov 23 01:41:14 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Nov 23 01:41:14 localhost systemd[1]: Reached target Initrd File Systems. Nov 23 01:41:14 localhost systemd[1]: Reached target Initrd Default Target. Nov 23 01:41:14 localhost systemd[1]: Starting dracut mount hook... Nov 23 01:41:14 localhost systemd[1]: Finished dracut mount hook. Nov 23 01:41:14 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Nov 23 01:41:14 localhost rpc.idmapd[411]: exiting on signal 15 Nov 23 01:41:14 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Nov 23 01:41:14 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Nov 23 01:41:14 localhost systemd[1]: Stopped target Network. Nov 23 01:41:14 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Nov 23 01:41:14 localhost systemd[1]: Stopped target Timer Units. Nov 23 01:41:14 localhost systemd[1]: dbus.socket: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Nov 23 01:41:14 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Nov 23 01:41:14 localhost systemd[1]: Stopped target Initrd Default Target. Nov 23 01:41:14 localhost systemd[1]: Stopped target Basic System. Nov 23 01:41:14 localhost systemd[1]: Stopped target Initrd Root Device. Nov 23 01:41:14 localhost systemd[1]: Stopped target Initrd /usr File System. Nov 23 01:41:14 localhost systemd[1]: Stopped target Path Units. Nov 23 01:41:14 localhost systemd[1]: Stopped target Remote File Systems. Nov 23 01:41:14 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Nov 23 01:41:14 localhost systemd[1]: Stopped target Slice Units. Nov 23 01:41:14 localhost systemd[1]: Stopped target Socket Units. Nov 23 01:41:14 localhost systemd[1]: Stopped target System Initialization. Nov 23 01:41:14 localhost systemd[1]: Stopped target Local File Systems. Nov 23 01:41:14 localhost systemd[1]: Stopped target Swaps. Nov 23 01:41:14 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped dracut mount hook. Nov 23 01:41:14 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped dracut pre-mount hook. Nov 23 01:41:14 localhost systemd[1]: Stopped target Local Encrypted Volumes. Nov 23 01:41:14 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Nov 23 01:41:14 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped dracut initqueue hook. Nov 23 01:41:14 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Apply Kernel Variables. Nov 23 01:41:14 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Load Kernel Modules. Nov 23 01:41:14 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Create Volatile Files and Directories. Nov 23 01:41:14 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Coldplug All udev Devices. Nov 23 01:41:14 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped dracut pre-trigger hook. Nov 23 01:41:14 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Nov 23 01:41:14 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Setup Virtual Console. Nov 23 01:41:14 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Nov 23 01:41:14 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Nov 23 01:41:14 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Closed udev Control Socket. Nov 23 01:41:14 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Closed udev Kernel Socket. Nov 23 01:41:14 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped dracut pre-udev hook. Nov 23 01:41:14 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped dracut cmdline hook. Nov 23 01:41:14 localhost systemd[1]: Starting Cleanup udev Database... Nov 23 01:41:14 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Nov 23 01:41:14 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Create List of Static Device Nodes. Nov 23 01:41:14 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Stopped Create System Users. Nov 23 01:41:14 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 23 01:41:14 localhost systemd[1]: Finished Cleanup udev Database. Nov 23 01:41:14 localhost systemd[1]: Reached target Switch Root. Nov 23 01:41:14 localhost systemd[1]: Starting Switch Root... Nov 23 01:41:14 localhost systemd[1]: Switching root. Nov 23 01:41:14 localhost systemd-journald[283]: Journal stopped Nov 23 01:41:15 localhost systemd-journald[283]: Received SIGTERM from PID 1 (systemd). Nov 23 01:41:15 localhost kernel: audit: type=1404 audit(1763880075.111:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Nov 23 01:41:15 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 01:41:15 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 01:41:15 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 01:41:15 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 01:41:15 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 01:41:15 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 01:41:15 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 01:41:15 localhost kernel: audit: type=1403 audit(1763880075.218:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 23 01:41:15 localhost systemd[1]: Successfully loaded SELinux policy in 112.999ms. Nov 23 01:41:15 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.958ms. Nov 23 01:41:15 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 23 01:41:15 localhost systemd[1]: Detected virtualization kvm. Nov 23 01:41:15 localhost systemd[1]: Detected architecture x86-64. Nov 23 01:41:15 localhost systemd-rc-local-generator[582]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 01:41:15 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 01:41:15 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 23 01:41:15 localhost systemd[1]: Stopped Switch Root. Nov 23 01:41:15 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 23 01:41:15 localhost systemd[1]: Created slice Slice /system/getty. Nov 23 01:41:15 localhost systemd[1]: Created slice Slice /system/modprobe. Nov 23 01:41:15 localhost systemd[1]: Created slice Slice /system/serial-getty. Nov 23 01:41:15 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Nov 23 01:41:15 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Nov 23 01:41:15 localhost systemd[1]: Created slice User and Session Slice. Nov 23 01:41:15 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Nov 23 01:41:15 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Nov 23 01:41:15 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Nov 23 01:41:15 localhost systemd[1]: Reached target Local Encrypted Volumes. Nov 23 01:41:15 localhost systemd[1]: Stopped target Switch Root. Nov 23 01:41:15 localhost systemd[1]: Stopped target Initrd File Systems. Nov 23 01:41:15 localhost systemd[1]: Stopped target Initrd Root File System. Nov 23 01:41:15 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Nov 23 01:41:15 localhost systemd[1]: Reached target Path Units. Nov 23 01:41:15 localhost systemd[1]: Reached target rpc_pipefs.target. Nov 23 01:41:15 localhost systemd[1]: Reached target Slice Units. Nov 23 01:41:15 localhost systemd[1]: Reached target Swaps. Nov 23 01:41:15 localhost systemd[1]: Reached target Local Verity Protected Volumes. Nov 23 01:41:15 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Nov 23 01:41:15 localhost systemd[1]: Reached target RPC Port Mapper. Nov 23 01:41:15 localhost systemd[1]: Listening on Process Core Dump Socket. Nov 23 01:41:15 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Nov 23 01:41:15 localhost systemd[1]: Listening on udev Control Socket. Nov 23 01:41:15 localhost systemd[1]: Listening on udev Kernel Socket. Nov 23 01:41:15 localhost systemd[1]: Mounting Huge Pages File System... Nov 23 01:41:15 localhost systemd[1]: Mounting POSIX Message Queue File System... Nov 23 01:41:15 localhost systemd[1]: Mounting Kernel Debug File System... Nov 23 01:41:15 localhost systemd[1]: Mounting Kernel Trace File System... Nov 23 01:41:15 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Nov 23 01:41:15 localhost systemd[1]: Starting Create List of Static Device Nodes... Nov 23 01:41:15 localhost systemd[1]: Starting Load Kernel Module configfs... Nov 23 01:41:15 localhost systemd[1]: Starting Load Kernel Module drm... Nov 23 01:41:15 localhost systemd[1]: Starting Load Kernel Module fuse... Nov 23 01:41:15 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Nov 23 01:41:15 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 23 01:41:15 localhost systemd[1]: Stopped File System Check on Root Device. Nov 23 01:41:15 localhost systemd[1]: Stopped Journal Service. Nov 23 01:41:15 localhost kernel: fuse: init (API version 7.36) Nov 23 01:41:15 localhost systemd[1]: Starting Journal Service... Nov 23 01:41:15 localhost systemd[1]: Starting Load Kernel Modules... Nov 23 01:41:15 localhost systemd[1]: Starting Generate network units from Kernel command line... Nov 23 01:41:15 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Nov 23 01:41:15 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Nov 23 01:41:15 localhost systemd[1]: Starting Coldplug All udev Devices... Nov 23 01:41:15 localhost systemd[1]: Mounted Huge Pages File System. Nov 23 01:41:15 localhost systemd[1]: Mounted POSIX Message Queue File System. Nov 23 01:41:15 localhost systemd-journald[618]: Journal started Nov 23 01:41:15 localhost systemd-journald[618]: Runtime Journal (/run/log/journal/6e0090cd4cf296f54418e234b90f721c) is 8.0M, max 314.7M, 306.7M free. Nov 23 01:41:15 localhost systemd[1]: Queued start job for default target Multi-User System. Nov 23 01:41:15 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Nov 23 01:41:15 localhost systemd-modules-load[619]: Module 'msr' is built in Nov 23 01:41:15 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Nov 23 01:41:15 localhost systemd[1]: Started Journal Service. Nov 23 01:41:15 localhost systemd[1]: Mounted Kernel Debug File System. Nov 23 01:41:15 localhost kernel: ACPI: bus type drm_connector registered Nov 23 01:41:15 localhost systemd[1]: Mounted Kernel Trace File System. Nov 23 01:41:15 localhost systemd[1]: Finished Create List of Static Device Nodes. Nov 23 01:41:15 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 23 01:41:15 localhost systemd[1]: Finished Load Kernel Module configfs. Nov 23 01:41:15 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 23 01:41:15 localhost systemd[1]: Finished Load Kernel Module drm. Nov 23 01:41:15 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 23 01:41:15 localhost systemd[1]: Finished Load Kernel Module fuse. Nov 23 01:41:15 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Nov 23 01:41:15 localhost systemd[1]: Finished Load Kernel Modules. Nov 23 01:41:15 localhost systemd[1]: Finished Generate network units from Kernel command line. Nov 23 01:41:15 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Nov 23 01:41:15 localhost systemd[1]: Mounting FUSE Control File System... Nov 23 01:41:15 localhost systemd[1]: Mounting Kernel Configuration File System... Nov 23 01:41:15 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Nov 23 01:41:15 localhost systemd[1]: Starting Rebuild Hardware Database... Nov 23 01:41:15 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Nov 23 01:41:15 localhost systemd[1]: Starting Load/Save Random Seed... Nov 23 01:41:15 localhost systemd[1]: Starting Apply Kernel Variables... Nov 23 01:41:15 localhost systemd[1]: Starting Create System Users... Nov 23 01:41:15 localhost systemd-journald[618]: Runtime Journal (/run/log/journal/6e0090cd4cf296f54418e234b90f721c) is 8.0M, max 314.7M, 306.7M free. Nov 23 01:41:15 localhost systemd-journald[618]: Received client request to flush runtime journal. Nov 23 01:41:15 localhost systemd[1]: Finished Coldplug All udev Devices. Nov 23 01:41:15 localhost systemd[1]: Mounted FUSE Control File System. Nov 23 01:41:15 localhost systemd[1]: Mounted Kernel Configuration File System. Nov 23 01:41:15 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Nov 23 01:41:15 localhost systemd[1]: Finished Load/Save Random Seed. Nov 23 01:41:15 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Nov 23 01:41:15 localhost systemd-sysusers[630]: Creating group 'sgx' with GID 989. Nov 23 01:41:15 localhost systemd-sysusers[630]: Creating group 'systemd-oom' with GID 988. Nov 23 01:41:15 localhost systemd[1]: Finished Apply Kernel Variables. Nov 23 01:41:15 localhost systemd-sysusers[630]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Nov 23 01:41:16 localhost systemd[1]: Finished Create System Users. Nov 23 01:41:16 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Nov 23 01:41:16 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Nov 23 01:41:16 localhost systemd[1]: Reached target Preparation for Local File Systems. Nov 23 01:41:16 localhost systemd[1]: Set up automount EFI System Partition Automount. Nov 23 01:41:16 localhost systemd[1]: Finished Rebuild Hardware Database. Nov 23 01:41:16 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Nov 23 01:41:16 localhost systemd-udevd[635]: Using default interface naming scheme 'rhel-9.0'. Nov 23 01:41:16 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Nov 23 01:41:16 localhost systemd[1]: Starting Load Kernel Module configfs... Nov 23 01:41:16 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 23 01:41:16 localhost systemd[1]: Finished Load Kernel Module configfs. Nov 23 01:41:16 localhost systemd-udevd[642]: Network interface NamePolicy= disabled on kernel command line. Nov 23 01:41:16 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Nov 23 01:41:16 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Nov 23 01:41:16 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Nov 23 01:41:16 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Nov 23 01:41:16 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Nov 23 01:41:16 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Nov 23 01:41:16 localhost systemd-fsck[684]: fsck.fat 4.2 (2021-01-31) Nov 23 01:41:16 localhost systemd-fsck[684]: /dev/vda2: 12 files, 1782/51145 clusters Nov 23 01:41:16 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Nov 23 01:41:16 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Nov 23 01:41:16 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Nov 23 01:41:16 localhost kernel: Console: switching to colour dummy device 80x25 Nov 23 01:41:16 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Nov 23 01:41:16 localhost kernel: [drm] features: -context_init Nov 23 01:41:16 localhost kernel: [drm] number of scanouts: 1 Nov 23 01:41:16 localhost kernel: [drm] number of cap sets: 0 Nov 23 01:41:16 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Nov 23 01:41:16 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Nov 23 01:41:16 localhost kernel: Console: switching to colour frame buffer device 128x48 Nov 23 01:41:16 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Nov 23 01:41:16 localhost kernel: SVM: TSC scaling supported Nov 23 01:41:16 localhost kernel: kvm: Nested Virtualization enabled Nov 23 01:41:16 localhost kernel: SVM: kvm: Nested Paging enabled Nov 23 01:41:16 localhost kernel: SVM: LBR virtualization supported Nov 23 01:41:16 localhost systemd[1]: Mounting /boot... Nov 23 01:41:16 localhost kernel: XFS (vda3): Mounting V5 Filesystem Nov 23 01:41:16 localhost kernel: XFS (vda3): Ending clean mount Nov 23 01:41:16 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Nov 23 01:41:16 localhost systemd[1]: Mounted /boot. Nov 23 01:41:16 localhost systemd[1]: Mounting /boot/efi... Nov 23 01:41:16 localhost systemd[1]: Mounted /boot/efi. Nov 23 01:41:17 localhost systemd[1]: Reached target Local File Systems. Nov 23 01:41:17 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Nov 23 01:41:17 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Nov 23 01:41:17 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Nov 23 01:41:17 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 23 01:41:17 localhost systemd[1]: Starting Automatic Boot Loader Update... Nov 23 01:41:17 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Nov 23 01:41:17 localhost systemd[1]: Starting Create Volatile Files and Directories... Nov 23 01:41:17 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 717 (bootctl) Nov 23 01:41:17 localhost systemd[1]: Starting File System Check on /dev/vda2... Nov 23 01:41:17 localhost systemd[1]: Finished File System Check on /dev/vda2. Nov 23 01:41:17 localhost systemd[1]: Mounting EFI System Partition Automount... Nov 23 01:41:17 localhost systemd[1]: Mounted EFI System Partition Automount. Nov 23 01:41:17 localhost systemd[1]: Finished Automatic Boot Loader Update. Nov 23 01:41:17 localhost systemd[1]: Finished Create Volatile Files and Directories. Nov 23 01:41:17 localhost systemd[1]: Starting Security Auditing Service... Nov 23 01:41:17 localhost systemd[1]: Starting RPC Bind... Nov 23 01:41:17 localhost systemd[1]: Starting Rebuild Journal Catalog... Nov 23 01:41:17 localhost auditd[726]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Nov 23 01:41:17 localhost auditd[726]: Init complete, auditd 3.0.7 listening for events (startup state enable) Nov 23 01:41:17 localhost systemd[1]: Finished Rebuild Journal Catalog. Nov 23 01:41:17 localhost systemd[1]: Started RPC Bind. Nov 23 01:41:17 localhost augenrules[731]: /sbin/augenrules: No change Nov 23 01:41:17 localhost augenrules[741]: No rules Nov 23 01:41:17 localhost augenrules[741]: enabled 1 Nov 23 01:41:17 localhost augenrules[741]: failure 1 Nov 23 01:41:17 localhost augenrules[741]: pid 726 Nov 23 01:41:17 localhost augenrules[741]: rate_limit 0 Nov 23 01:41:17 localhost augenrules[741]: backlog_limit 8192 Nov 23 01:41:17 localhost augenrules[741]: lost 0 Nov 23 01:41:17 localhost augenrules[741]: backlog 1 Nov 23 01:41:17 localhost augenrules[741]: backlog_wait_time 60000 Nov 23 01:41:17 localhost augenrules[741]: backlog_wait_time_actual 0 Nov 23 01:41:17 localhost augenrules[741]: enabled 1 Nov 23 01:41:17 localhost augenrules[741]: failure 1 Nov 23 01:41:17 localhost augenrules[741]: pid 726 Nov 23 01:41:17 localhost augenrules[741]: rate_limit 0 Nov 23 01:41:17 localhost augenrules[741]: backlog_limit 8192 Nov 23 01:41:17 localhost augenrules[741]: lost 0 Nov 23 01:41:17 localhost augenrules[741]: backlog 3 Nov 23 01:41:17 localhost augenrules[741]: backlog_wait_time 60000 Nov 23 01:41:17 localhost augenrules[741]: backlog_wait_time_actual 0 Nov 23 01:41:17 localhost augenrules[741]: enabled 1 Nov 23 01:41:17 localhost augenrules[741]: failure 1 Nov 23 01:41:17 localhost augenrules[741]: pid 726 Nov 23 01:41:17 localhost augenrules[741]: rate_limit 0 Nov 23 01:41:17 localhost augenrules[741]: backlog_limit 8192 Nov 23 01:41:17 localhost augenrules[741]: lost 0 Nov 23 01:41:17 localhost augenrules[741]: backlog 3 Nov 23 01:41:17 localhost augenrules[741]: backlog_wait_time 60000 Nov 23 01:41:17 localhost augenrules[741]: backlog_wait_time_actual 0 Nov 23 01:41:17 localhost systemd[1]: Started Security Auditing Service. Nov 23 01:41:17 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Nov 23 01:41:17 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Nov 23 01:41:17 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Nov 23 01:41:17 localhost systemd[1]: Starting Update is Completed... Nov 23 01:41:17 localhost systemd[1]: Finished Update is Completed. Nov 23 01:41:17 localhost systemd[1]: Reached target System Initialization. Nov 23 01:41:17 localhost systemd[1]: Started dnf makecache --timer. Nov 23 01:41:17 localhost systemd[1]: Started Daily rotation of log files. Nov 23 01:41:17 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Nov 23 01:41:17 localhost systemd[1]: Reached target Timer Units. Nov 23 01:41:17 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Nov 23 01:41:17 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Nov 23 01:41:17 localhost systemd[1]: Reached target Socket Units. Nov 23 01:41:17 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Nov 23 01:41:17 localhost systemd[1]: Starting D-Bus System Message Bus... Nov 23 01:41:17 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 23 01:41:17 localhost systemd[1]: Started D-Bus System Message Bus. Nov 23 01:41:17 localhost systemd[1]: Reached target Basic System. Nov 23 01:41:17 localhost systemd[1]: Starting NTP client/server... Nov 23 01:41:17 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Nov 23 01:41:17 localhost journal[751]: Ready Nov 23 01:41:17 localhost systemd[1]: Started irqbalance daemon. Nov 23 01:41:17 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Nov 23 01:41:17 localhost systemd[1]: Starting System Logging Service... Nov 23 01:41:17 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 01:41:17 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 01:41:17 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 01:41:17 localhost systemd[1]: Reached target sshd-keygen.target. Nov 23 01:41:17 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Nov 23 01:41:17 localhost systemd[1]: Reached target User and Group Name Lookups. Nov 23 01:41:17 localhost systemd[1]: Starting User Login Management... Nov 23 01:41:17 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Nov 23 01:41:17 localhost rsyslogd[759]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="759" x-info="https://www.rsyslog.com"] start Nov 23 01:41:17 localhost rsyslogd[759]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Nov 23 01:41:17 localhost systemd[1]: Started System Logging Service. Nov 23 01:41:17 localhost chronyd[766]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Nov 23 01:41:17 localhost chronyd[766]: Using right/UTC timezone to obtain leap second data Nov 23 01:41:17 localhost chronyd[766]: Loaded seccomp filter (level 2) Nov 23 01:41:17 localhost systemd[1]: Started NTP client/server. Nov 23 01:41:17 localhost systemd-logind[760]: New seat seat0. Nov 23 01:41:17 localhost systemd-logind[760]: Watching system buttons on /dev/input/event0 (Power Button) Nov 23 01:41:17 localhost systemd-logind[760]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Nov 23 01:41:17 localhost systemd[1]: Started User Login Management. Nov 23 01:41:17 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Nov 23 01:41:18 localhost cloud-init[770]: Cloud-init v. 22.1-9.el9 running 'init-local' at Sun, 23 Nov 2025 06:41:18 +0000. Up 7.24 seconds. Nov 23 01:41:18 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpj1z3t1o1.mount: Deactivated successfully. Nov 23 01:41:18 localhost systemd[1]: Starting Hostname Service... Nov 23 01:41:18 localhost systemd[1]: Started Hostname Service. Nov 23 01:41:18 localhost systemd-hostnamed[784]: Hostname set to (static) Nov 23 01:41:18 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Nov 23 01:41:18 localhost systemd[1]: Reached target Preparation for Network. Nov 23 01:41:18 localhost systemd[1]: Starting Network Manager... Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6271] NetworkManager (version 1.42.2-1.el9) is starting... (boot:4000d39c-f227-466c-a68c-2e7ed8c2aed0) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6277] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Nov 23 01:41:18 localhost systemd[1]: Started Network Manager. Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6329] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Nov 23 01:41:18 localhost systemd[1]: Reached target Network. Nov 23 01:41:18 localhost systemd[1]: Starting Network Manager Wait Online... Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6424] manager[0x55c6f9236020]: monitoring kernel firmware directory '/lib/firmware'. Nov 23 01:41:18 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6472] hostname: hostname: using hostnamed Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6473] hostname: static hostname changed from (none) to "np0005532600.novalocal" Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6497] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Nov 23 01:41:18 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Nov 23 01:41:18 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Nov 23 01:41:18 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Nov 23 01:41:18 localhost systemd[1]: Started GSSAPI Proxy Daemon. Nov 23 01:41:18 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Nov 23 01:41:18 localhost systemd[1]: Reached target NFS client services. Nov 23 01:41:18 localhost systemd[1]: Reached target Preparation for Remote File Systems. Nov 23 01:41:18 localhost systemd[1]: Reached target Remote File Systems. Nov 23 01:41:18 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6832] manager[0x55c6f9236020]: rfkill: Wi-Fi hardware radio set enabled Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6836] manager[0x55c6f9236020]: rfkill: WWAN hardware radio set enabled Nov 23 01:41:18 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6926] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6928] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6941] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6945] manager: Networking is enabled by state file Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6986] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.6988] settings: Loaded settings plugin: keyfile (internal) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7036] dhcp: init: Using DHCP client 'internal' Nov 23 01:41:18 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7043] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7066] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7078] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7091] device (lo): Activation: starting connection 'lo' (5f04b6d2-d3c3-4747-853e-9ba51cd2b330) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7106] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7113] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7160] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7165] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7168] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7172] device (eth0): carrier: link connected Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7176] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7185] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7218] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7223] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7225] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Nov 23 01:41:18 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7230] manager: NetworkManager state is now CONNECTING Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7232] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7241] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7247] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7294] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7297] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7306] device (lo): Activation: successful, device activated. Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7316] dhcp4 (eth0): state changed new lease, address=38.102.83.164 Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7325] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7353] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7390] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7393] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7401] manager: NetworkManager state is now CONNECTED_SITE Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7407] device (eth0): Activation: successful, device activated. Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7415] manager: NetworkManager state is now CONNECTED_GLOBAL Nov 23 01:41:18 localhost NetworkManager[789]: [1763880078.7423] manager: startup complete Nov 23 01:41:18 localhost systemd[1]: Finished Network Manager Wait Online. Nov 23 01:41:18 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Nov 23 01:41:18 localhost cloud-init[911]: Cloud-init v. 22.1-9.el9 running 'init' at Sun, 23 Nov 2025 06:41:18 +0000. Up 8.17 seconds. Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | eth0 | True | 38.102.83.164 | 255.255.255.0 | global | fa:16:3e:ca:f3:e3 | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | eth0 | True | fe80::f816:3eff:feca:f3e3/64 | . | link | fa:16:3e:ca:f3:e3 | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | lo | True | ::1/128 | . | host | . | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +-------+-------------+---------+-----------+-------+ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | Route | Destination | Gateway | Interface | Flags | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: +-------+-------------+---------+-----------+-------+ Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Nov 23 01:41:18 localhost cloud-init[911]: ci-info: | 3 | multicast | :: | eth0 | U | Nov 23 01:41:19 localhost cloud-init[911]: ci-info: +-------+-------------+---------+-----------+-------+ Nov 23 01:41:19 localhost systemd[1]: Starting Authorization Manager... Nov 23 01:41:19 localhost systemd[1]: Started Dynamic System Tuning Daemon. Nov 23 01:41:19 localhost polkitd[1036]: Started polkitd version 0.117 Nov 23 01:41:19 localhost systemd[1]: Started Authorization Manager. Nov 23 01:41:23 localhost cloud-init[911]: Generating public/private rsa key pair. Nov 23 01:41:23 localhost cloud-init[911]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Nov 23 01:41:23 localhost cloud-init[911]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Nov 23 01:41:23 localhost cloud-init[911]: The key fingerprint is: Nov 23 01:41:23 localhost cloud-init[911]: SHA256:TcVldc7+PSD4cVjSuCCLbs7l0tFc4Q1edByfPYhlC6s root@np0005532600.novalocal Nov 23 01:41:23 localhost cloud-init[911]: The key's randomart image is: Nov 23 01:41:23 localhost cloud-init[911]: +---[RSA 3072]----+ Nov 23 01:41:23 localhost cloud-init[911]: | oo=+++| Nov 23 01:41:23 localhost cloud-init[911]: | +Xo++=| Nov 23 01:41:23 localhost cloud-init[911]: | . .+=== o=| Nov 23 01:41:23 localhost cloud-init[911]: | . oo++=. ..| Nov 23 01:41:23 localhost cloud-init[911]: | . .SEo= o .| Nov 23 01:41:23 localhost cloud-init[911]: | . . o. + . o| Nov 23 01:41:23 localhost cloud-init[911]: | o... . .o| Nov 23 01:41:23 localhost cloud-init[911]: | +.o. .| Nov 23 01:41:23 localhost cloud-init[911]: | o.. | Nov 23 01:41:23 localhost cloud-init[911]: +----[SHA256]-----+ Nov 23 01:41:23 localhost cloud-init[911]: Generating public/private ecdsa key pair. Nov 23 01:41:23 localhost cloud-init[911]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Nov 23 01:41:23 localhost cloud-init[911]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Nov 23 01:41:23 localhost cloud-init[911]: The key fingerprint is: Nov 23 01:41:23 localhost cloud-init[911]: SHA256:4Ahzd9HCFsljiENOC8cMNArdSEasgBWWpfurm6aOmAY root@np0005532600.novalocal Nov 23 01:41:23 localhost cloud-init[911]: The key's randomart image is: Nov 23 01:41:23 localhost cloud-init[911]: +---[ECDSA 256]---+ Nov 23 01:41:23 localhost cloud-init[911]: |oB%@=. +o+ | Nov 23 01:41:23 localhost cloud-init[911]: |++=B*.. O.. | Nov 23 01:41:23 localhost cloud-init[911]: |o.+ +.oo.o | Nov 23 01:41:23 localhost cloud-init[911]: |. = + o | Nov 23 01:41:23 localhost cloud-init[911]: | . . . S | Nov 23 01:41:23 localhost cloud-init[911]: |E . | Nov 23 01:41:23 localhost cloud-init[911]: |. . | Nov 23 01:41:23 localhost cloud-init[911]: |oo.. . | Nov 23 01:41:23 localhost cloud-init[911]: |B++o. | Nov 23 01:41:23 localhost cloud-init[911]: +----[SHA256]-----+ Nov 23 01:41:23 localhost cloud-init[911]: Generating public/private ed25519 key pair. Nov 23 01:41:23 localhost cloud-init[911]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Nov 23 01:41:23 localhost cloud-init[911]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Nov 23 01:41:23 localhost cloud-init[911]: The key fingerprint is: Nov 23 01:41:23 localhost cloud-init[911]: SHA256:70GKfZXeEeL2eoUPu0JlYnnCvbHRtVS/fkGM+q6Ku00 root@np0005532600.novalocal Nov 23 01:41:23 localhost cloud-init[911]: The key's randomart image is: Nov 23 01:41:23 localhost cloud-init[911]: +--[ED25519 256]--+ Nov 23 01:41:23 localhost cloud-init[911]: | o| Nov 23 01:41:23 localhost cloud-init[911]: | o.o| Nov 23 01:41:23 localhost cloud-init[911]: | ..+o++| Nov 23 01:41:23 localhost cloud-init[911]: | .BoOoo| Nov 23 01:41:23 localhost cloud-init[911]: | S .o=*.O | Nov 23 01:41:23 localhost cloud-init[911]: | o + +oo*.o| Nov 23 01:41:23 localhost cloud-init[911]: | . oE+...o*.| Nov 23 01:41:23 localhost cloud-init[911]: | +o .o.o o| Nov 23 01:41:23 localhost cloud-init[911]: | +ooo.o+.. | Nov 23 01:41:23 localhost cloud-init[911]: +----[SHA256]-----+ Nov 23 01:41:23 localhost sm-notify[1132]: Version 2.5.4 starting Nov 23 01:41:23 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Nov 23 01:41:23 localhost systemd[1]: Reached target Cloud-config availability. Nov 23 01:41:23 localhost systemd[1]: Reached target Network is Online. Nov 23 01:41:23 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Nov 23 01:41:23 localhost sshd[1133]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Nov 23 01:41:23 localhost systemd[1]: Starting Crash recovery kernel arming... Nov 23 01:41:23 localhost systemd[1]: Starting Notify NFS peers of a restart... Nov 23 01:41:23 localhost systemd[1]: Starting OpenSSH server daemon... Nov 23 01:41:23 localhost systemd[1]: Starting Permit User Sessions... Nov 23 01:41:23 localhost systemd[1]: Started Notify NFS peers of a restart. Nov 23 01:41:23 localhost systemd[1]: Finished Permit User Sessions. Nov 23 01:41:23 localhost systemd[1]: Started Command Scheduler. Nov 23 01:41:23 localhost systemd[1]: Started Getty on tty1. Nov 23 01:41:23 localhost systemd[1]: Started Serial Getty on ttyS0. Nov 23 01:41:23 localhost systemd[1]: Reached target Login Prompts. Nov 23 01:41:23 localhost systemd[1]: Started OpenSSH server daemon. Nov 23 01:41:23 localhost systemd[1]: Reached target Multi-User System. Nov 23 01:41:23 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Nov 23 01:41:23 localhost sshd[1143]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 23 01:41:23 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Nov 23 01:41:23 localhost sshd[1155]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost sshd[1168]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost sshd[1175]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost sshd[1192]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost kdumpctl[1139]: kdump: No kdump initial ramdisk found. Nov 23 01:41:23 localhost kdumpctl[1139]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Nov 23 01:41:23 localhost sshd[1200]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost sshd[1214]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost sshd[1240]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost sshd[1264]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:23 localhost cloud-init[1271]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Sun, 23 Nov 2025 06:41:23 +0000. Up 12.55 seconds. Nov 23 01:41:23 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Nov 23 01:41:23 localhost systemd[1]: Starting Execute cloud user/final scripts... Nov 23 01:41:23 localhost chronyd[766]: Selected source 142.4.192.253 (2.rhel.pool.ntp.org) Nov 23 01:41:23 localhost chronyd[766]: System clock TAI offset set to 37 seconds Nov 23 01:41:23 localhost dracut[1438]: dracut-057-21.git20230214.el9 Nov 23 01:41:23 localhost cloud-init[1442]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Sun, 23 Nov 2025 06:41:23 +0000. Up 12.92 seconds. Nov 23 01:41:23 localhost cloud-init[1456]: ############################################################# Nov 23 01:41:23 localhost cloud-init[1457]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Nov 23 01:41:23 localhost cloud-init[1460]: 256 SHA256:4Ahzd9HCFsljiENOC8cMNArdSEasgBWWpfurm6aOmAY root@np0005532600.novalocal (ECDSA) Nov 23 01:41:23 localhost cloud-init[1465]: 256 SHA256:70GKfZXeEeL2eoUPu0JlYnnCvbHRtVS/fkGM+q6Ku00 root@np0005532600.novalocal (ED25519) Nov 23 01:41:23 localhost cloud-init[1472]: 3072 SHA256:TcVldc7+PSD4cVjSuCCLbs7l0tFc4Q1edByfPYhlC6s root@np0005532600.novalocal (RSA) Nov 23 01:41:23 localhost cloud-init[1474]: -----END SSH HOST KEY FINGERPRINTS----- Nov 23 01:41:23 localhost dracut[1440]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Nov 23 01:41:23 localhost cloud-init[1477]: ############################################################# Nov 23 01:41:23 localhost cloud-init[1442]: Cloud-init v. 22.1-9.el9 finished at Sun, 23 Nov 2025 06:41:23 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 13.19 seconds Nov 23 01:41:24 localhost systemd[1]: Reloading Network Manager... Nov 23 01:41:24 localhost NetworkManager[789]: [1763880084.1093] audit: op="reload" arg="0" pid=1551 uid=0 result="success" Nov 23 01:41:24 localhost NetworkManager[789]: [1763880084.1105] config: signal: SIGHUP (no changes from disk) Nov 23 01:41:24 localhost systemd[1]: Reloaded Network Manager. Nov 23 01:41:24 localhost systemd[1]: Finished Execute cloud user/final scripts. Nov 23 01:41:24 localhost systemd[1]: Reached target Cloud-init target. Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Nov 23 01:41:24 localhost dracut[1440]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Nov 23 01:41:24 localhost dracut[1440]: memstrack is not available Nov 23 01:41:24 localhost dracut[1440]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Nov 23 01:41:24 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Nov 23 01:41:25 localhost dracut[1440]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Nov 23 01:41:25 localhost dracut[1440]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Nov 23 01:41:25 localhost dracut[1440]: memstrack is not available Nov 23 01:41:25 localhost dracut[1440]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Nov 23 01:41:25 localhost dracut[1440]: *** Including module: systemd *** Nov 23 01:41:25 localhost dracut[1440]: *** Including module: systemd-initrd *** Nov 23 01:41:25 localhost dracut[1440]: *** Including module: i18n *** Nov 23 01:41:25 localhost dracut[1440]: No KEYMAP configured. Nov 23 01:41:25 localhost dracut[1440]: *** Including module: drm *** Nov 23 01:41:26 localhost dracut[1440]: *** Including module: prefixdevname *** Nov 23 01:41:26 localhost dracut[1440]: *** Including module: kernel-modules *** Nov 23 01:41:27 localhost dracut[1440]: *** Including module: kernel-modules-extra *** Nov 23 01:41:27 localhost dracut[1440]: *** Including module: qemu *** Nov 23 01:41:27 localhost dracut[1440]: *** Including module: fstab-sys *** Nov 23 01:41:27 localhost dracut[1440]: *** Including module: rootfs-block *** Nov 23 01:41:27 localhost dracut[1440]: *** Including module: terminfo *** Nov 23 01:41:27 localhost dracut[1440]: *** Including module: udev-rules *** Nov 23 01:41:27 localhost dracut[1440]: Skipping udev rule: 91-permissions.rules Nov 23 01:41:27 localhost dracut[1440]: Skipping udev rule: 80-drivers-modprobe.rules Nov 23 01:41:27 localhost dracut[1440]: *** Including module: virtiofs *** Nov 23 01:41:27 localhost dracut[1440]: *** Including module: dracut-systemd *** Nov 23 01:41:28 localhost dracut[1440]: *** Including module: usrmount *** Nov 23 01:41:28 localhost dracut[1440]: *** Including module: base *** Nov 23 01:41:28 localhost dracut[1440]: *** Including module: fs-lib *** Nov 23 01:41:28 localhost dracut[1440]: *** Including module: kdumpbase *** Nov 23 01:41:28 localhost dracut[1440]: *** Including module: microcode_ctl-fw_dir_override *** Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl module: mangling fw_dir Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: configuration "intel" is ignored Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: configuration "intel-06-2d-07" is ignored Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: configuration "intel-06-4e-03" is ignored Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: configuration "intel-06-4f-01" is ignored Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Nov 23 01:41:28 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: configuration "intel-06-55-04" is ignored Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: configuration "intel-06-5e-03" is ignored Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: configuration "intel-06-8c-01" is ignored Nov 23 01:41:28 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Nov 23 01:41:29 localhost dracut[1440]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Nov 23 01:41:29 localhost dracut[1440]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Nov 23 01:41:29 localhost dracut[1440]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Nov 23 01:41:29 localhost dracut[1440]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Nov 23 01:41:29 localhost dracut[1440]: *** Including module: shutdown *** Nov 23 01:41:29 localhost dracut[1440]: *** Including module: squash *** Nov 23 01:41:29 localhost dracut[1440]: *** Including modules done *** Nov 23 01:41:29 localhost dracut[1440]: *** Installing kernel module dependencies *** Nov 23 01:41:29 localhost dracut[1440]: *** Installing kernel module dependencies done *** Nov 23 01:41:29 localhost dracut[1440]: *** Resolving executable dependencies *** Nov 23 01:41:31 localhost dracut[1440]: *** Resolving executable dependencies done *** Nov 23 01:41:31 localhost dracut[1440]: *** Hardlinking files *** Nov 23 01:41:31 localhost dracut[1440]: Mode: real Nov 23 01:41:31 localhost dracut[1440]: Files: 1099 Nov 23 01:41:31 localhost dracut[1440]: Linked: 3 files Nov 23 01:41:31 localhost dracut[1440]: Compared: 0 xattrs Nov 23 01:41:31 localhost dracut[1440]: Compared: 373 files Nov 23 01:41:31 localhost dracut[1440]: Saved: 61.04 KiB Nov 23 01:41:31 localhost dracut[1440]: Duration: 0.053914 seconds Nov 23 01:41:31 localhost dracut[1440]: *** Hardlinking files done *** Nov 23 01:41:31 localhost dracut[1440]: Could not find 'strip'. Not stripping the initramfs. Nov 23 01:41:31 localhost dracut[1440]: *** Generating early-microcode cpio image *** Nov 23 01:41:31 localhost dracut[1440]: *** Constructing AuthenticAMD.bin *** Nov 23 01:41:31 localhost dracut[1440]: *** Store current command line parameters *** Nov 23 01:41:31 localhost dracut[1440]: Stored kernel commandline: Nov 23 01:41:31 localhost dracut[1440]: No dracut internal kernel commandline stored in the initramfs Nov 23 01:41:31 localhost dracut[1440]: *** Install squash loader *** Nov 23 01:41:32 localhost dracut[1440]: *** Squashing the files inside the initramfs *** Nov 23 01:41:33 localhost dracut[1440]: *** Squashing the files inside the initramfs done *** Nov 23 01:41:33 localhost dracut[1440]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Nov 23 01:41:33 localhost dracut[1440]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Nov 23 01:41:34 localhost kdumpctl[1139]: kdump: kexec: loaded kdump kernel Nov 23 01:41:34 localhost kdumpctl[1139]: kdump: Starting kdump: [OK] Nov 23 01:41:34 localhost systemd[1]: Finished Crash recovery kernel arming. Nov 23 01:41:34 localhost systemd[1]: Startup finished in 1.262s (kernel) + 3.050s (initrd) + 19.145s (userspace) = 23.458s. Nov 23 01:41:36 localhost sshd[4174]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:41:36 localhost systemd[1]: Created slice User Slice of UID 1000. Nov 23 01:41:36 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Nov 23 01:41:36 localhost systemd-logind[760]: New session 1 of user zuul. Nov 23 01:41:36 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Nov 23 01:41:36 localhost systemd[1]: Starting User Manager for UID 1000... Nov 23 01:41:36 localhost systemd[4178]: Queued start job for default target Main User Target. Nov 23 01:41:36 localhost systemd[4178]: Created slice User Application Slice. Nov 23 01:41:36 localhost systemd[4178]: Started Mark boot as successful after the user session has run 2 minutes. Nov 23 01:41:36 localhost systemd[4178]: Started Daily Cleanup of User's Temporary Directories. Nov 23 01:41:36 localhost systemd[4178]: Reached target Paths. Nov 23 01:41:36 localhost systemd[4178]: Reached target Timers. Nov 23 01:41:36 localhost systemd[4178]: Starting D-Bus User Message Bus Socket... Nov 23 01:41:36 localhost systemd[4178]: Starting Create User's Volatile Files and Directories... Nov 23 01:41:36 localhost systemd[4178]: Finished Create User's Volatile Files and Directories. Nov 23 01:41:36 localhost systemd[4178]: Listening on D-Bus User Message Bus Socket. Nov 23 01:41:36 localhost systemd[4178]: Reached target Sockets. Nov 23 01:41:36 localhost systemd[4178]: Reached target Basic System. Nov 23 01:41:36 localhost systemd[1]: Started User Manager for UID 1000. Nov 23 01:41:36 localhost systemd[4178]: Reached target Main User Target. Nov 23 01:41:36 localhost systemd[4178]: Startup finished in 102ms. Nov 23 01:41:36 localhost systemd[1]: Started Session 1 of User zuul. Nov 23 01:41:37 localhost python3[4230]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 23 01:41:43 localhost python3[4248]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 23 01:41:48 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 23 01:41:53 localhost python3[4303]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 23 01:41:54 localhost python3[4333]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Nov 23 01:41:57 localhost python3[4349]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:41:58 localhost python3[4364]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:41:58 localhost python3[4423]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:41:59 localhost python3[4464]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1763880118.5446663-341-249445904948675/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=9b5494e49fcb49b49888b8dc5cb5b62a_id_rsa follow=False checksum=94dd85ba8292f5967bc9625cab0e41e70f821e5f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:00 localhost python3[4537]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:42:00 localhost python3[4578]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1763880120.3515792-441-17839957325496/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=9b5494e49fcb49b49888b8dc5cb5b62a_id_rsa.pub follow=False checksum=b8866d3c93314579cf249ee96df418f4be8bf0ea backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:03 localhost python3[4606]: ansible-ping Invoked with data=pong Nov 23 01:42:04 localhost python3[4620]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 23 01:42:10 localhost python3[4673]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Nov 23 01:42:12 localhost python3[4695]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:12 localhost python3[4709]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:13 localhost python3[4723]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:14 localhost python3[4737]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:15 localhost python3[4751]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:15 localhost python3[4765]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:18 localhost python3[4781]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:19 localhost python3[4829]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:42:19 localhost python3[4872]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1763880138.6048753-55-125711767740346/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:21 localhost python3[4900]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:21 localhost python3[4914]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:21 localhost python3[4928]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:21 localhost python3[4942]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:22 localhost python3[4956]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:22 localhost python3[4970]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:22 localhost python3[4984]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDLOQd4ZLtkZXQGY6UwAr/06ppWQK4fDO3HaqxPk98csyOCBXsliSKK39Bso828+5srIXiW7aI6aC9P5mwi4mUZlGPfJlQbfrcGvY+b/SocuvaGK+1RrHLoJCT52LBhwgrzlXio2jeksZeein8iaTrhsPrOAs7KggIL/rB9hEiB3NaOPWhhoCP4vlW6MEMExGcqB/1FVxXFBPnLkEyW0Lk7ycVflZl2ocRxbfjZi0+tI1Wlinp8PvSQSc/WVrAcDgKjc/mB4ODPOyYy3G8FHgfMsrXSDEyjBKgLKMsdCrAUcqJQWjkqXleXSYOV4q3pzL+9umK+q/e3P/bIoSFQzmJKTU1eDfuvPXmow9F5H54fii/Da7ezlMJ+wPGHJrRAkmzvMbALy7xwswLhZMkOGNtRcPqaKYRmIBKpw3o6bCTtcNUHOtOQnzwY8JzrM2eBWJBXAANYw+9/ho80JIiwhg29CFNpVBuHbql2YxJQNrnl90guN65rYNpDxdIluweyUf8= anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:22 localhost python3[4998]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:23 localhost python3[5012]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:23 localhost python3[5026]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:23 localhost python3[5040]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:23 localhost python3[5054]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:24 localhost python3[5068]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:24 localhost python3[5082]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:24 localhost python3[5096]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:25 localhost python3[5110]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:25 localhost python3[5124]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:25 localhost python3[5138]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:25 localhost python3[5152]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:26 localhost python3[5166]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:26 localhost python3[5180]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:26 localhost python3[5194]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:26 localhost python3[5208]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDZdI7t1cxYx65heVI24HTV4F7oQLW1zyfxHreL2TIJKxjyrUUKIFEUmTutcBlJRLNT2Eoix6x1sOw9YrchloCLcn//SGfTElr9mSc5jbjb7QXEU+zJMhtxyEJ1Po3CUGnj7ckiIXw7wcawZtrEOAQ9pH3ExYCJcEMiyNjRQZCxT3tPK+S4B95EWh5Fsrz9CkwpjNRPPH7LigCeQTM3Wc7r97utAslBUUvYceDSLA7rMgkitJE38b7rZBeYzsGQ8YYUBjTCtehqQXxCRjizbHWaaZkBU+N3zkKB6n/iCNGIO690NK7A/qb6msTijiz1PeuM8ThOsi9qXnbX5v0PoTpcFSojV7NHAQ71f0XXuS43FhZctT+Dcx44dT8Fb5vJu2cJGrk+qF8ZgJYNpRS7gPg0EG2EqjK7JMf9ULdjSu0r+KlqIAyLvtzT4eOnQipoKlb/WG5D/0ohKv7OMQ352ggfkBFIQsRXyyTCT98Ft9juqPuahi3CAQmP4H9dyE+7+Kz437PEtsxLmfm6naNmWi7Ee1DqWPwS8rEajsm4sNM4wW9gdBboJQtc0uZw0DfLj1I9r3Mc8Ol0jYtz0yNQDSzVLrGCaJlC311trU70tZ+ZkAVV6Mn8lOhSbj1cK0lvSr6ZK4dgqGl3I1eTZJJhbLNdg7UOVaiRx9543+C/p/As7w== brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:27 localhost python3[5222]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:27 localhost python3[5236]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:27 localhost python3[5250]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:42:36 localhost python3[5266]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Nov 23 01:42:36 localhost systemd[1]: Starting Time & Date Service... Nov 23 01:42:36 localhost systemd[1]: Started Time & Date Service. Nov 23 01:42:36 localhost systemd-timedated[5268]: Changed time zone to 'UTC' (UTC). Nov 23 01:42:38 localhost python3[5288]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:38 localhost python3[5334]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:42:39 localhost python3[5375]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1763880158.5278468-451-79230756521858/source _original_basename=tmppv02q71y follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:40 localhost python3[5435]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:42:40 localhost python3[5476]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1763880160.0796962-540-125964965269582/source _original_basename=tmpyi0p5pb4 follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:42 localhost python3[5538]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:42:42 localhost python3[5581]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1763880162.2277327-684-48847764498366/source _original_basename=tmpdi5igbsn follow=False checksum=9313104c4584898a1afe992edc322b557e0f1f28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:44 localhost python3[5609]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:42:44 localhost python3[5625]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:42:45 localhost python3[5675]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:42:45 localhost python3[5718]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1763880165.3451676-810-17388607418767/source _original_basename=tmp86fd38md follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:42:47 localhost python3[5749]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163ec2-ffbe-440c-fc09-000000000023-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:42:48 localhost python3[5767]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-440c-fc09-000000000024-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Nov 23 01:42:50 localhost python3[5785]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:43:06 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Nov 23 01:43:09 localhost python3[5803]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:43:34 localhost chronyd[766]: Selected source 167.160.187.12 (2.rhel.pool.ntp.org) Nov 23 01:44:09 localhost systemd-logind[760]: Session 1 logged out. Waiting for processes to exit. Nov 23 01:44:17 localhost systemd[4178]: Starting Mark boot as successful... Nov 23 01:44:17 localhost systemd[4178]: Finished Mark boot as successful. Nov 23 01:44:38 localhost systemd[1]: Unmounting EFI System Partition Automount... Nov 23 01:44:38 localhost systemd[1]: efi.mount: Deactivated successfully. Nov 23 01:44:38 localhost systemd[1]: Unmounted EFI System Partition Automount. Nov 23 01:45:00 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Nov 23 01:45:00 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Nov 23 01:45:00 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Nov 23 01:45:00 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Nov 23 01:45:00 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Nov 23 01:45:01 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Nov 23 01:45:01 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Nov 23 01:45:01 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Nov 23 01:45:01 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Nov 23 01:45:01 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0380] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Nov 23 01:45:01 localhost systemd-udevd[5810]: Network interface NamePolicy= disabled on kernel command line. Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0531] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0564] settings: (eth1): created default wired connection 'Wired connection 1' Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0569] device (eth1): carrier: link connected Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0572] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0577] policy: auto-activating connection 'Wired connection 1' (20619eb8-452f-398b-a3ad-5f4df0a05c79) Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0584] device (eth1): Activation: starting connection 'Wired connection 1' (20619eb8-452f-398b-a3ad-5f4df0a05c79) Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0585] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0589] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0595] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Nov 23 01:45:01 localhost NetworkManager[789]: [1763880301.0599] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Nov 23 01:45:01 localhost sshd[5812]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:45:01 localhost systemd-logind[760]: New session 3 of user zuul. Nov 23 01:45:01 localhost systemd[1]: Started Session 3 of User zuul. Nov 23 01:45:02 localhost python3[5829]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163ec2-ffbe-cf9d-063a-000000000254-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:45:02 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Nov 23 01:45:15 localhost python3[5879]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:45:15 localhost python3[5922]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1763880314.8288605-282-74187742703673/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=cdda28cc4a40911049cc9ca02c0f0347b4d102d9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:45:16 localhost python3[5952]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 01:45:16 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Nov 23 01:45:16 localhost systemd[1]: Stopped Network Manager Wait Online. Nov 23 01:45:16 localhost systemd[1]: Stopping Network Manager Wait Online... Nov 23 01:45:16 localhost systemd[1]: Stopping Network Manager... Nov 23 01:45:16 localhost NetworkManager[789]: [1763880316.5490] caught SIGTERM, shutting down normally. Nov 23 01:45:16 localhost NetworkManager[789]: [1763880316.5561] dhcp4 (eth0): canceled DHCP transaction Nov 23 01:45:16 localhost NetworkManager[789]: [1763880316.5562] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Nov 23 01:45:16 localhost NetworkManager[789]: [1763880316.5562] dhcp4 (eth0): state changed no lease Nov 23 01:45:16 localhost NetworkManager[789]: [1763880316.5566] manager: NetworkManager state is now CONNECTING Nov 23 01:45:16 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Nov 23 01:45:16 localhost NetworkManager[789]: [1763880316.5662] dhcp4 (eth1): canceled DHCP transaction Nov 23 01:45:16 localhost NetworkManager[789]: [1763880316.5662] dhcp4 (eth1): state changed no lease Nov 23 01:45:16 localhost NetworkManager[789]: [1763880316.5774] exiting (success) Nov 23 01:45:16 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Nov 23 01:45:16 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Nov 23 01:45:16 localhost systemd[1]: Stopped Network Manager. Nov 23 01:45:16 localhost systemd[1]: NetworkManager.service: Consumed 1.546s CPU time. Nov 23 01:45:16 localhost systemd[1]: Starting Network Manager... Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.6265] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:4000d39c-f227-466c-a68c-2e7ed8c2aed0) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.6268] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.6287] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Nov 23 01:45:16 localhost systemd[1]: Started Network Manager. Nov 23 01:45:16 localhost systemd[1]: Starting Network Manager Wait Online... Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.6350] manager[0x55673270c090]: monitoring kernel firmware directory '/lib/firmware'. Nov 23 01:45:16 localhost systemd[1]: Starting Hostname Service... Nov 23 01:45:16 localhost systemd[1]: Started Hostname Service. Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7180] hostname: hostname: using hostnamed Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7181] hostname: static hostname changed from (none) to "np0005532600.novalocal" Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7188] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7195] manager[0x55673270c090]: rfkill: Wi-Fi hardware radio set enabled Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7195] manager[0x55673270c090]: rfkill: WWAN hardware radio set enabled Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7235] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7235] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7236] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7237] manager: Networking is enabled by state file Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7254] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7255] settings: Loaded settings plugin: keyfile (internal) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7304] dhcp: init: Using DHCP client 'internal' Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7308] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7315] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7321] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7331] device (lo): Activation: starting connection 'lo' (5f04b6d2-d3c3-4747-853e-9ba51cd2b330) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7341] device (eth0): carrier: link connected Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7346] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7354] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7355] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7365] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7375] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7382] device (eth1): carrier: link connected Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7387] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7395] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (20619eb8-452f-398b-a3ad-5f4df0a05c79) (indicated) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7396] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7404] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7414] device (eth1): Activation: starting connection 'Wired connection 1' (20619eb8-452f-398b-a3ad-5f4df0a05c79) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7442] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7445] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7448] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7450] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7455] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7457] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7460] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7463] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7470] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7474] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7496] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7503] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7538] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7543] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7549] device (lo): Activation: successful, device activated. Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7594] dhcp4 (eth0): state changed new lease, address=38.102.83.164 Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7598] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7670] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7684] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7685] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7688] manager: NetworkManager state is now CONNECTED_SITE Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7690] device (eth0): Activation: successful, device activated. Nov 23 01:45:16 localhost NetworkManager[5966]: [1763880316.7693] manager: NetworkManager state is now CONNECTED_GLOBAL Nov 23 01:45:16 localhost python3[6023]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163ec2-ffbe-cf9d-063a-0000000000ff-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:45:26 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Nov 23 01:45:46 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 23 01:46:01 localhost NetworkManager[5966]: [1763880361.7864] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Nov 23 01:46:01 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Nov 23 01:46:01 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Nov 23 01:46:01 localhost NetworkManager[5966]: [1763880361.8053] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Nov 23 01:46:01 localhost NetworkManager[5966]: [1763880361.8060] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Nov 23 01:46:01 localhost NetworkManager[5966]: [1763880361.8075] device (eth1): Activation: successful, device activated. Nov 23 01:46:01 localhost NetworkManager[5966]: [1763880361.8086] manager: startup complete Nov 23 01:46:01 localhost systemd[1]: Finished Network Manager Wait Online. Nov 23 01:46:11 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Nov 23 01:46:17 localhost systemd[1]: session-3.scope: Deactivated successfully. Nov 23 01:46:17 localhost systemd[1]: session-3.scope: Consumed 1.464s CPU time. Nov 23 01:46:17 localhost systemd-logind[760]: Session 3 logged out. Waiting for processes to exit. Nov 23 01:46:17 localhost systemd-logind[760]: Removed session 3. Nov 23 01:47:17 localhost systemd[4178]: Created slice User Background Tasks Slice. Nov 23 01:47:17 localhost systemd[4178]: Starting Cleanup of User's Temporary Files and Directories... Nov 23 01:47:17 localhost systemd[4178]: Finished Cleanup of User's Temporary Files and Directories. Nov 23 01:48:12 localhost sshd[6053]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:48:40 localhost sshd[6055]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:48:40 localhost systemd-logind[760]: New session 4 of user zuul. Nov 23 01:48:40 localhost systemd[1]: Started Session 4 of User zuul. Nov 23 01:48:41 localhost python3[6106]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:48:41 localhost python3[6149]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1763880521.0089633-628-201702211142734/source _original_basename=tmpx_c9af7a follow=False checksum=3e577edf01b35295a52e6af8ef16e8cd6411b692 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:48:49 localhost systemd[1]: session-4.scope: Deactivated successfully. Nov 23 01:48:49 localhost systemd-logind[760]: Session 4 logged out. Waiting for processes to exit. Nov 23 01:48:49 localhost systemd-logind[760]: Removed session 4. Nov 23 01:54:16 localhost sshd[6168]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:54:16 localhost systemd-logind[760]: New session 5 of user zuul. Nov 23 01:54:16 localhost systemd[1]: Started Session 5 of User zuul. Nov 23 01:54:16 localhost python3[6187]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-b917-5414-000000001d00-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:54:18 localhost python3[6206]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:54:18 localhost python3[6222]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:54:18 localhost python3[6238]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:54:19 localhost python3[6254]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:54:20 localhost python3[6270]: ansible-ansible.builtin.file Invoked with path=/etc/systemd/system.conf.d state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:54:21 localhost python3[6318]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system.conf.d/override.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:54:21 localhost python3[6362]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system.conf.d/override.conf mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1763880861.055896-594-159620813638376/source _original_basename=tmpshyjfc2k follow=False checksum=a05098bd3d2321238ea1169d0e6f135b35b392d4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:54:23 localhost python3[6393]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Nov 23 01:54:23 localhost systemd[1]: Reloading. Nov 23 01:54:23 localhost systemd-rc-local-generator[6410]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 01:54:23 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 01:54:25 localhost python3[6439]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Nov 23 01:54:25 localhost python3[6455]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:54:26 localhost python3[6473]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:54:26 localhost python3[6491]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:54:26 localhost python3[6509]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:54:28 localhost python3[6526]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-b917-5414-000000001d07-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:54:30 localhost python3[6546]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 01:54:33 localhost systemd[1]: session-5.scope: Deactivated successfully. Nov 23 01:54:33 localhost systemd[1]: session-5.scope: Consumed 3.922s CPU time. Nov 23 01:54:33 localhost systemd-logind[760]: Session 5 logged out. Waiting for processes to exit. Nov 23 01:54:33 localhost systemd-logind[760]: Removed session 5. Nov 23 01:55:46 localhost sshd[6552]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:55:46 localhost systemd-logind[760]: New session 6 of user zuul. Nov 23 01:55:46 localhost systemd[1]: Started Session 6 of User zuul. Nov 23 01:55:47 localhost systemd[1]: Starting RHSM dbus service... Nov 23 01:55:47 localhost systemd[1]: Started RHSM dbus service. Nov 23 01:55:47 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Nov 23 01:55:47 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Nov 23 01:55:47 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Nov 23 01:55:47 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Nov 23 01:55:50 localhost rhsm-service[6576]: INFO [subscription_manager.managerlib:90] Consumer created: np0005532600.novalocal (088759a5-187c-45d2-8f56-63060592b84b) Nov 23 01:55:50 localhost subscription-manager[6576]: Registered system with identity: 088759a5-187c-45d2-8f56-63060592b84b Nov 23 01:55:51 localhost rhsm-service[6576]: INFO [subscription_manager.entcertlib:131] certs updated: Nov 23 01:55:51 localhost rhsm-service[6576]: Total updates: 1 Nov 23 01:55:51 localhost rhsm-service[6576]: Found (local) serial# [] Nov 23 01:55:51 localhost rhsm-service[6576]: Expected (UEP) serial# [9096304252121680027] Nov 23 01:55:51 localhost rhsm-service[6576]: Added (new) Nov 23 01:55:51 localhost rhsm-service[6576]: [sn:9096304252121680027 ( Content Access,) @ /etc/pki/entitlement/9096304252121680027.pem] Nov 23 01:55:51 localhost rhsm-service[6576]: Deleted (rogue): Nov 23 01:55:51 localhost rhsm-service[6576]: Nov 23 01:55:51 localhost subscription-manager[6576]: Added subscription for 'Content Access' contract 'None' Nov 23 01:55:51 localhost subscription-manager[6576]: Added subscription for product ' Content Access' Nov 23 01:55:52 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Nov 23 01:55:52 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Nov 23 01:55:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 01:55:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 01:55:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 01:55:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 01:55:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 01:55:58 localhost python3[6668]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-2700-69c0-00000000000d-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 01:56:00 localhost python3[6687]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 01:56:17 localhost systemd[1]: Starting Cleanup of Temporary Directories... Nov 23 01:56:17 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Nov 23 01:56:17 localhost systemd[1]: Finished Cleanup of Temporary Directories. Nov 23 01:56:17 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Nov 23 01:56:30 localhost setsebool[6764]: The virt_use_nfs policy boolean was changed to 1 by root Nov 23 01:56:30 localhost setsebool[6764]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Nov 23 01:56:38 localhost kernel: SELinux: Converting 405 SID table entries... Nov 23 01:56:38 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 01:56:38 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 01:56:38 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 01:56:38 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 01:56:38 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 01:56:38 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 01:56:38 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 01:56:51 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=3 res=1 Nov 23 01:56:51 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 23 01:56:51 localhost systemd[1]: Starting man-db-cache-update.service... Nov 23 01:56:51 localhost systemd[1]: Reloading. Nov 23 01:56:51 localhost systemd-rc-local-generator[7617]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 01:56:51 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 01:56:51 localhost systemd[1]: Queuing reload/restart jobs for marked units… Nov 23 01:56:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 01:57:00 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 23 01:57:00 localhost systemd[1]: Finished man-db-cache-update.service. Nov 23 01:57:00 localhost systemd[1]: man-db-cache-update.service: Consumed 9.979s CPU time. Nov 23 01:57:00 localhost systemd[1]: run-rcc8b99ceadcb4323932305e245c251bd.service: Deactivated successfully. Nov 23 01:57:48 localhost systemd[1]: var-lib-containers-storage-overlay-compat3140163890-merged.mount: Deactivated successfully. Nov 23 01:57:48 localhost podman[18357]: 2025-11-23 06:57:48.044457446 +0000 UTC m=+0.108484420 system refresh Nov 23 01:57:48 localhost systemd[4178]: Starting D-Bus User Message Bus... Nov 23 01:57:48 localhost dbus-broker-launch[18415]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Nov 23 01:57:48 localhost dbus-broker-launch[18415]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Nov 23 01:57:48 localhost systemd[4178]: Started D-Bus User Message Bus. Nov 23 01:57:48 localhost journal[18415]: Ready Nov 23 01:57:48 localhost systemd[4178]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Nov 23 01:57:48 localhost systemd[4178]: Created slice Slice /user. Nov 23 01:57:48 localhost systemd[4178]: podman-18399.scope: unit configures an IP firewall, but not running as root. Nov 23 01:57:48 localhost systemd[4178]: (This warning is only shown for the first unit using IP firewalling.) Nov 23 01:57:48 localhost systemd[4178]: Started podman-18399.scope. Nov 23 01:57:49 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Nov 23 01:57:49 localhost systemd[4178]: Started podman-pause-8633442a.scope. Nov 23 01:57:51 localhost systemd-logind[760]: Session 6 logged out. Waiting for processes to exit. Nov 23 01:57:51 localhost systemd[1]: session-6.scope: Deactivated successfully. Nov 23 01:57:51 localhost systemd[1]: session-6.scope: Consumed 50.548s CPU time. Nov 23 01:57:51 localhost systemd-logind[760]: Removed session 6. Nov 23 01:58:06 localhost sshd[18419]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:58:06 localhost sshd[18421]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:58:06 localhost sshd[18420]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:58:06 localhost sshd[18422]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:58:06 localhost sshd[18423]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:58:12 localhost sshd[18429]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:58:12 localhost systemd-logind[760]: New session 7 of user zuul. Nov 23 01:58:12 localhost systemd[1]: Started Session 7 of User zuul. Nov 23 01:58:12 localhost python3[18446]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNCkB7p9LmmWxu9wpbrJrqVn4JZ7f+VJ00W182w53AQSIeQLknyP18I2ONGlHlNwPa3biIMCUro78BFjmg67uek= zuul@np0005532597.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:58:13 localhost python3[18462]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNCkB7p9LmmWxu9wpbrJrqVn4JZ7f+VJ00W182w53AQSIeQLknyP18I2ONGlHlNwPa3biIMCUro78BFjmg67uek= zuul@np0005532597.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:58:15 localhost systemd[1]: session-7.scope: Deactivated successfully. Nov 23 01:58:15 localhost systemd-logind[760]: Session 7 logged out. Waiting for processes to exit. Nov 23 01:58:15 localhost systemd-logind[760]: Removed session 7. Nov 23 01:58:32 localhost sshd[18463]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:59:43 localhost sshd[18466]: main: sshd: ssh-rsa algorithm is disabled Nov 23 01:59:43 localhost systemd-logind[760]: New session 8 of user zuul. Nov 23 01:59:43 localhost systemd[1]: Started Session 8 of User zuul. Nov 23 01:59:43 localhost python3[18485]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa 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 zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 01:59:44 localhost python3[18501]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005532600.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Nov 23 01:59:45 localhost python3[18551]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:59:46 localhost python3[18594]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1763881185.4656115-90-134710947712317/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=9b5494e49fcb49b49888b8dc5cb5b62a_id_rsa follow=False checksum=94dd85ba8292f5967bc9625cab0e41e70f821e5f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:59:47 localhost python3[18656]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:59:48 localhost python3[18699]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1763881187.4360952-180-165403504076301/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=9b5494e49fcb49b49888b8dc5cb5b62a_id_rsa.pub follow=False checksum=b8866d3c93314579cf249ee96df418f4be8bf0ea backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:59:50 localhost python3[18729]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:59:51 localhost python3[18775]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:59:51 localhost python3[18791]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmp2u3mw0hs recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:59:52 localhost python3[18851]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:59:52 localhost python3[18867]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmppwto7wz0 recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:59:54 localhost python3[18927]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 01:59:54 localhost python3[18943]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmpbfg4l7i7 recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 01:59:55 localhost systemd[1]: session-8.scope: Deactivated successfully. Nov 23 01:59:55 localhost systemd[1]: session-8.scope: Consumed 3.532s CPU time. Nov 23 01:59:55 localhost systemd-logind[760]: Session 8 logged out. Waiting for processes to exit. Nov 23 01:59:55 localhost systemd-logind[760]: Removed session 8. Nov 23 02:02:02 localhost sshd[18974]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:02:02 localhost systemd-logind[760]: New session 9 of user zuul. Nov 23 02:02:02 localhost systemd[1]: Started Session 9 of User zuul. Nov 23 02:02:02 localhost python3[19020]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:06:22 localhost sshd[19024]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:07:02 localhost systemd[1]: session-9.scope: Deactivated successfully. Nov 23 02:07:02 localhost systemd-logind[760]: Session 9 logged out. Waiting for processes to exit. Nov 23 02:07:02 localhost systemd-logind[760]: Removed session 9. Nov 23 02:13:42 localhost sshd[19031]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:13:42 localhost systemd-logind[760]: New session 10 of user zuul. Nov 23 02:13:42 localhost systemd[1]: Started Session 10 of User zuul. Nov 23 02:13:42 localhost python3[19048]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-26f6-5ab9-00000000000c-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:13:44 localhost python3[19068]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163ec2-ffbe-26f6-5ab9-00000000000d-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:13:49 localhost python3[19087]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Nov 23 02:13:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:14:48 localhost python3[19244]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Nov 23 02:14:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:14:52 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:15:00 localhost python3[19444]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Nov 23 02:15:03 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:15:03 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:15:09 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:15:09 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:15:32 localhost python3[19838]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Nov 23 02:15:35 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:15:40 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:15:40 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:16:03 localhost python3[20114]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Nov 23 02:16:06 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:16:06 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:16:12 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:16:12 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:16:36 localhost python3[20452]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-26f6-5ab9-000000000013-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:16:42 localhost python3[20471]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:16:53 localhost sshd[20501]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:17:07 localhost kernel: SELinux: Converting 485 SID table entries... Nov 23 02:17:07 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:17:07 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:17:07 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:17:07 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:17:07 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:17:07 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:17:07 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:17:08 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=4 res=1 Nov 23 02:17:08 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Nov 23 02:17:11 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 23 02:17:11 localhost systemd[1]: Starting man-db-cache-update.service... Nov 23 02:17:11 localhost systemd[1]: Reloading. Nov 23 02:17:11 localhost systemd-rc-local-generator[21172]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:17:11 localhost systemd-sysv-generator[21176]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:17:11 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:17:11 localhost systemd[1]: Starting dnf makecache... Nov 23 02:17:11 localhost systemd[1]: Queuing reload/restart jobs for marked units… Nov 23 02:17:11 localhost dnf[21365]: Updating Subscription Management repositories. Nov 23 02:17:12 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 23 02:17:12 localhost systemd[1]: Finished man-db-cache-update.service. Nov 23 02:17:12 localhost systemd[1]: run-rdb92c1bcc08b44c0bbcb80a7aa9e4ace.service: Deactivated successfully. Nov 23 02:17:12 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:17:12 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Nov 23 02:17:13 localhost dnf[21365]: Failed determining last makecache time. Nov 23 02:17:13 localhost dnf[21365]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 36 kB/s | 4.5 kB 00:00 Nov 23 02:17:13 localhost dnf[21365]: Red Hat Enterprise Linux 9 for x86_64 - High Av 32 kB/s | 4.0 kB 00:00 Nov 23 02:17:13 localhost dnf[21365]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 30 kB/s | 4.1 kB 00:00 Nov 23 02:17:14 localhost dnf[21365]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 34 kB/s | 4.5 kB 00:00 Nov 23 02:17:14 localhost dnf[21365]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 30 kB/s | 4.1 kB 00:00 Nov 23 02:17:14 localhost dnf[21365]: Fast Datapath for RHEL 9 x86_64 (RPMs) 30 kB/s | 4.0 kB 00:00 Nov 23 02:17:14 localhost dnf[21365]: Red Hat OpenStack Platform 17.1 for RHEL 9 x86_ 26 kB/s | 4.0 kB 00:00 Nov 23 02:17:14 localhost dnf[21365]: Metadata cache created. Nov 23 02:17:15 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Nov 23 02:17:15 localhost systemd[1]: Finished dnf makecache. Nov 23 02:17:15 localhost systemd[1]: dnf-makecache.service: Consumed 2.807s CPU time. Nov 23 02:17:39 localhost python3[21791]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-26f6-5ab9-000000000015-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:18:05 localhost python3[21811]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:18:06 localhost python3[21859]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:18:06 localhost python3[21902]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1763882285.7747073-286-276845061079857/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=4997906c68798c344e568ee48e178d8dbd720a7a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:18:07 localhost python3[21932]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Nov 23 02:18:07 localhost systemd-journald[618]: Field hash table of /run/log/journal/6e0090cd4cf296f54418e234b90f721c/system.journal has a fill level at 89.2 (297 of 333 items), suggesting rotation. Nov 23 02:18:07 localhost systemd-journald[618]: /run/log/journal/6e0090cd4cf296f54418e234b90f721c/system.journal: Journal header limits reached or header out-of-date, rotating. Nov 23 02:18:07 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Nov 23 02:18:07 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Nov 23 02:18:08 localhost python3[21953]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Nov 23 02:18:08 localhost python3[21973]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Nov 23 02:18:08 localhost python3[21993]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Nov 23 02:18:09 localhost python3[22013]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Nov 23 02:18:12 localhost python3[22033]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 02:18:12 localhost systemd[1]: Starting LSB: Bring up/down networking... Nov 23 02:18:12 localhost network[22036]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Nov 23 02:18:12 localhost network[22047]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Nov 23 02:18:12 localhost network[22036]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:12 localhost network[22048]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:12 localhost network[22036]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Nov 23 02:18:12 localhost network[22049]: It is advised to switch to 'NetworkManager' instead for network management. Nov 23 02:18:12 localhost NetworkManager[5966]: [1763882292.5965] audit: op="connections-reload" pid=22077 uid=0 result="success" Nov 23 02:18:12 localhost network[22036]: Bringing up loopback interface: [ OK ] Nov 23 02:18:12 localhost NetworkManager[5966]: [1763882292.8208] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=22165 uid=0 result="success" Nov 23 02:18:12 localhost network[22036]: Bringing up interface eth0: [ OK ] Nov 23 02:18:12 localhost systemd[1]: Started LSB: Bring up/down networking. Nov 23 02:18:13 localhost python3[22206]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 02:18:13 localhost systemd[1]: Starting Open vSwitch Database Unit... Nov 23 02:18:13 localhost chown[22210]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Nov 23 02:18:13 localhost ovs-ctl[22215]: /etc/openvswitch/conf.db does not exist ... (warning). Nov 23 02:18:13 localhost ovs-ctl[22215]: Creating empty database /etc/openvswitch/conf.db [ OK ] Nov 23 02:18:13 localhost ovs-ctl[22215]: Starting ovsdb-server [ OK ] Nov 23 02:18:13 localhost ovs-vsctl[22264]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Nov 23 02:18:13 localhost ovs-vsctl[22284]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.6-141.el9fdp "external-ids:system-id=\"178ff4c5-12d4-4b6a-8072-ef762e244ad6\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Nov 23 02:18:13 localhost ovs-ctl[22215]: Configuring Open vSwitch system IDs [ OK ] Nov 23 02:18:13 localhost ovs-ctl[22215]: Enabling remote OVSDB managers [ OK ] Nov 23 02:18:13 localhost systemd[1]: Started Open vSwitch Database Unit. Nov 23 02:18:13 localhost ovs-vsctl[22290]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005532600.novalocal Nov 23 02:18:13 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Nov 23 02:18:13 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Nov 23 02:18:13 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Nov 23 02:18:13 localhost kernel: openvswitch: Open vSwitch switching datapath Nov 23 02:18:13 localhost ovs-ctl[22335]: Inserting openvswitch module [ OK ] Nov 23 02:18:13 localhost ovs-ctl[22303]: Starting ovs-vswitchd [ OK ] Nov 23 02:18:13 localhost ovs-ctl[22303]: Enabling remote OVSDB managers [ OK ] Nov 23 02:18:13 localhost ovs-vsctl[22354]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005532600.novalocal Nov 23 02:18:13 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Nov 23 02:18:13 localhost systemd[1]: Starting Open vSwitch... Nov 23 02:18:13 localhost systemd[1]: Finished Open vSwitch. Nov 23 02:18:17 localhost python3[22372]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-26f6-5ab9-00000000001a-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:18:18 localhost NetworkManager[5966]: [1763882298.2569] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22530 uid=0 result="success" Nov 23 02:18:18 localhost ifup[22531]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:18 localhost ifup[22532]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:18 localhost ifup[22533]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:18 localhost NetworkManager[5966]: [1763882298.2880] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22539 uid=0 result="success" Nov 23 02:18:18 localhost ovs-vsctl[22541]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:7a:93:e2 -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Nov 23 02:18:18 localhost kernel: device ovs-system entered promiscuous mode Nov 23 02:18:18 localhost NetworkManager[5966]: [1763882298.3446] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Nov 23 02:18:18 localhost systemd-udevd[22543]: Network interface NamePolicy= disabled on kernel command line. Nov 23 02:18:18 localhost kernel: Timeout policy base is empty Nov 23 02:18:18 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Nov 23 02:18:18 localhost kernel: device br-ex entered promiscuous mode Nov 23 02:18:18 localhost NetworkManager[5966]: [1763882298.3925] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Nov 23 02:18:18 localhost NetworkManager[5966]: [1763882298.4197] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22568 uid=0 result="success" Nov 23 02:18:18 localhost NetworkManager[5966]: [1763882298.4417] device (br-ex): carrier: link connected Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.4993] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22597 uid=0 result="success" Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.5464] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22612 uid=0 result="success" Nov 23 02:18:21 localhost NET[22637]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.6357] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.6521] dhcp4 (eth1): canceled DHCP transaction Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.6522] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.6522] dhcp4 (eth1): state changed no lease Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.6564] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22646 uid=0 result="success" Nov 23 02:18:21 localhost ifup[22647]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:21 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Nov 23 02:18:21 localhost ifup[22648]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:21 localhost ifup[22650]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:21 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.6969] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22664 uid=0 result="success" Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.7383] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22674 uid=0 result="success" Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.7456] device (eth1): carrier: link connected Nov 23 02:18:21 localhost NetworkManager[5966]: [1763882301.7680] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22683 uid=0 result="success" Nov 23 02:18:21 localhost ipv6_wait_tentative[22695]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Nov 23 02:18:22 localhost ipv6_wait_tentative[22700]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Nov 23 02:18:23 localhost NetworkManager[5966]: [1763882303.8370] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22709 uid=0 result="success" Nov 23 02:18:23 localhost ovs-vsctl[22724]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Nov 23 02:18:23 localhost kernel: device eth1 entered promiscuous mode Nov 23 02:18:23 localhost NetworkManager[5966]: [1763882303.9137] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22732 uid=0 result="success" Nov 23 02:18:23 localhost ifup[22733]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:23 localhost ifup[22734]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:23 localhost ifup[22735]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:23 localhost NetworkManager[5966]: [1763882303.9444] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22741 uid=0 result="success" Nov 23 02:18:23 localhost NetworkManager[5966]: [1763882303.9847] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22751 uid=0 result="success" Nov 23 02:18:23 localhost ifup[22752]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:23 localhost ifup[22753]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:23 localhost ifup[22754]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:24 localhost NetworkManager[5966]: [1763882304.0153] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22760 uid=0 result="success" Nov 23 02:18:24 localhost ovs-vsctl[22763]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Nov 23 02:18:24 localhost kernel: device vlan22 entered promiscuous mode Nov 23 02:18:24 localhost NetworkManager[5966]: [1763882304.0902] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Nov 23 02:18:24 localhost systemd-udevd[22765]: Network interface NamePolicy= disabled on kernel command line. Nov 23 02:18:24 localhost NetworkManager[5966]: [1763882304.1136] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22774 uid=0 result="success" Nov 23 02:18:24 localhost NetworkManager[5966]: [1763882304.1356] device (vlan22): carrier: link connected Nov 23 02:18:27 localhost NetworkManager[5966]: [1763882307.1894] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22803 uid=0 result="success" Nov 23 02:18:27 localhost NetworkManager[5966]: [1763882307.2430] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22818 uid=0 result="success" Nov 23 02:18:27 localhost NetworkManager[5966]: [1763882307.3122] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22839 uid=0 result="success" Nov 23 02:18:27 localhost ifup[22840]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:27 localhost ifup[22841]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:27 localhost ifup[22842]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:27 localhost NetworkManager[5966]: [1763882307.3468] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22848 uid=0 result="success" Nov 23 02:18:27 localhost ovs-vsctl[22851]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Nov 23 02:18:27 localhost kernel: device vlan44 entered promiscuous mode Nov 23 02:18:27 localhost NetworkManager[5966]: [1763882307.3898] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Nov 23 02:18:27 localhost systemd-udevd[22853]: Network interface NamePolicy= disabled on kernel command line. Nov 23 02:18:27 localhost NetworkManager[5966]: [1763882307.4181] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22863 uid=0 result="success" Nov 23 02:18:27 localhost NetworkManager[5966]: [1763882307.4419] device (vlan44): carrier: link connected Nov 23 02:18:30 localhost NetworkManager[5966]: [1763882310.5043] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22893 uid=0 result="success" Nov 23 02:18:30 localhost NetworkManager[5966]: [1763882310.5556] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22908 uid=0 result="success" Nov 23 02:18:30 localhost NetworkManager[5966]: [1763882310.6190] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22929 uid=0 result="success" Nov 23 02:18:30 localhost ifup[22930]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:30 localhost ifup[22931]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:30 localhost ifup[22932]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:30 localhost NetworkManager[5966]: [1763882310.6533] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22938 uid=0 result="success" Nov 23 02:18:30 localhost ovs-vsctl[22941]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Nov 23 02:18:30 localhost kernel: device vlan21 entered promiscuous mode Nov 23 02:18:30 localhost NetworkManager[5966]: [1763882310.6954] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Nov 23 02:18:30 localhost systemd-udevd[22943]: Network interface NamePolicy= disabled on kernel command line. Nov 23 02:18:30 localhost NetworkManager[5966]: [1763882310.7222] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22953 uid=0 result="success" Nov 23 02:18:30 localhost NetworkManager[5966]: [1763882310.7478] device (vlan21): carrier: link connected Nov 23 02:18:31 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Nov 23 02:18:33 localhost NetworkManager[5966]: [1763882313.8101] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22984 uid=0 result="success" Nov 23 02:18:33 localhost NetworkManager[5966]: [1763882313.8574] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22999 uid=0 result="success" Nov 23 02:18:33 localhost NetworkManager[5966]: [1763882313.9191] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23020 uid=0 result="success" Nov 23 02:18:33 localhost ifup[23021]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:33 localhost ifup[23022]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:33 localhost ifup[23023]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:33 localhost NetworkManager[5966]: [1763882313.9481] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23029 uid=0 result="success" Nov 23 02:18:33 localhost ovs-vsctl[23032]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Nov 23 02:18:33 localhost kernel: device vlan23 entered promiscuous mode Nov 23 02:18:33 localhost NetworkManager[5966]: [1763882313.9907] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Nov 23 02:18:33 localhost systemd-udevd[23035]: Network interface NamePolicy= disabled on kernel command line. Nov 23 02:18:34 localhost NetworkManager[5966]: [1763882314.0171] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23044 uid=0 result="success" Nov 23 02:18:34 localhost NetworkManager[5966]: [1763882314.0370] device (vlan23): carrier: link connected Nov 23 02:18:37 localhost NetworkManager[5966]: [1763882317.0991] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23074 uid=0 result="success" Nov 23 02:18:37 localhost NetworkManager[5966]: [1763882317.1493] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23089 uid=0 result="success" Nov 23 02:18:37 localhost NetworkManager[5966]: [1763882317.2158] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23110 uid=0 result="success" Nov 23 02:18:37 localhost ifup[23111]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:37 localhost ifup[23112]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:37 localhost ifup[23113]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:37 localhost NetworkManager[5966]: [1763882317.2498] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23119 uid=0 result="success" Nov 23 02:18:37 localhost ovs-vsctl[23122]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Nov 23 02:18:37 localhost systemd-udevd[23124]: Network interface NamePolicy= disabled on kernel command line. Nov 23 02:18:37 localhost kernel: device vlan20 entered promiscuous mode Nov 23 02:18:37 localhost NetworkManager[5966]: [1763882317.3019] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Nov 23 02:18:37 localhost NetworkManager[5966]: [1763882317.3288] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23134 uid=0 result="success" Nov 23 02:18:37 localhost NetworkManager[5966]: [1763882317.3516] device (vlan20): carrier: link connected Nov 23 02:18:40 localhost NetworkManager[5966]: [1763882320.4053] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23164 uid=0 result="success" Nov 23 02:18:40 localhost NetworkManager[5966]: [1763882320.4533] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23179 uid=0 result="success" Nov 23 02:18:40 localhost NetworkManager[5966]: [1763882320.5140] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23200 uid=0 result="success" Nov 23 02:18:40 localhost ifup[23201]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:40 localhost ifup[23202]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:40 localhost ifup[23203]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:40 localhost NetworkManager[5966]: [1763882320.5455] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23209 uid=0 result="success" Nov 23 02:18:40 localhost ovs-vsctl[23212]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Nov 23 02:18:40 localhost NetworkManager[5966]: [1763882320.6037] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23219 uid=0 result="success" Nov 23 02:18:41 localhost NetworkManager[5966]: [1763882321.6719] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23246 uid=0 result="success" Nov 23 02:18:41 localhost NetworkManager[5966]: [1763882321.7256] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23261 uid=0 result="success" Nov 23 02:18:41 localhost NetworkManager[5966]: [1763882321.7867] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23282 uid=0 result="success" Nov 23 02:18:41 localhost ifup[23283]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:41 localhost ifup[23284]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:41 localhost ifup[23285]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:41 localhost NetworkManager[5966]: [1763882321.8187] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23291 uid=0 result="success" Nov 23 02:18:41 localhost ovs-vsctl[23294]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Nov 23 02:18:41 localhost NetworkManager[5966]: [1763882321.9209] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23301 uid=0 result="success" Nov 23 02:18:42 localhost NetworkManager[5966]: [1763882322.9885] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23329 uid=0 result="success" Nov 23 02:18:43 localhost NetworkManager[5966]: [1763882323.0367] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23344 uid=0 result="success" Nov 23 02:18:43 localhost NetworkManager[5966]: [1763882323.0972] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23365 uid=0 result="success" Nov 23 02:18:43 localhost ifup[23366]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:43 localhost ifup[23367]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:43 localhost ifup[23368]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:43 localhost NetworkManager[5966]: [1763882323.1308] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23374 uid=0 result="success" Nov 23 02:18:43 localhost ovs-vsctl[23377]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Nov 23 02:18:43 localhost NetworkManager[5966]: [1763882323.1892] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23384 uid=0 result="success" Nov 23 02:18:44 localhost NetworkManager[5966]: [1763882324.2523] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23412 uid=0 result="success" Nov 23 02:18:44 localhost NetworkManager[5966]: [1763882324.2975] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23427 uid=0 result="success" Nov 23 02:18:44 localhost NetworkManager[5966]: [1763882324.3548] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23448 uid=0 result="success" Nov 23 02:18:44 localhost ifup[23449]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:44 localhost ifup[23450]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:44 localhost ifup[23451]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:44 localhost NetworkManager[5966]: [1763882324.3842] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23457 uid=0 result="success" Nov 23 02:18:44 localhost ovs-vsctl[23460]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Nov 23 02:18:44 localhost NetworkManager[5966]: [1763882324.4385] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23467 uid=0 result="success" Nov 23 02:18:45 localhost NetworkManager[5966]: [1763882325.4983] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23495 uid=0 result="success" Nov 23 02:18:45 localhost NetworkManager[5966]: [1763882325.5455] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23510 uid=0 result="success" Nov 23 02:18:45 localhost NetworkManager[5966]: [1763882325.6040] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23531 uid=0 result="success" Nov 23 02:18:45 localhost ifup[23532]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Nov 23 02:18:45 localhost ifup[23533]: 'network-scripts' will be removed from distribution in near future. Nov 23 02:18:45 localhost ifup[23534]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Nov 23 02:18:45 localhost NetworkManager[5966]: [1763882325.6340] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23540 uid=0 result="success" Nov 23 02:18:45 localhost ovs-vsctl[23543]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Nov 23 02:18:45 localhost NetworkManager[5966]: [1763882325.6935] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23550 uid=0 result="success" Nov 23 02:18:46 localhost NetworkManager[5966]: [1763882326.7528] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23578 uid=0 result="success" Nov 23 02:18:46 localhost NetworkManager[5966]: [1763882326.8019] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23593 uid=0 result="success" Nov 23 02:19:39 localhost python3[23626]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-26f6-5ab9-00000000001b-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:19:46 localhost python3[23645]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 02:19:46 localhost python3[23661]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 02:19:48 localhost python3[23675]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDOKZr8PG10fgooAYx7np5uhL0Ss3iAaKeURZdNPfV5ba3iaMvT1EENHmR3/WAxm8Fsgz0QO2mEHp1t+smOEFEZRFFrLUWta5IoW/ZwEL8jqlRXgfv3vUCh6zQmIGDEB/DS5I40/29XgkMumOIc/60jiPAKTdIs4BFmtGM0Wp265j0Dvunhl8pTWfwfqfMIdNrRN/bH2ohgTAW4pLxcz7C4CSUoqq0Xw59WCMfokfJ7rtyIYf8KJAjdbqkUA1wYOYBC3/qZ3AJOD6O2HYLPOdfBI0RmoLkVKnBnrcJXQSwqGqV3qP1AqRQJqnYLKKXUxVPAKrKfqwX8e3FobDACGF+wRLYV5qEZWy0SPQ5sBPiLn0fkwn5cXPiYDYh5J8sM1T4QoCJM15FbHVXRCkWyW4a4/31MqgYOze+WqqkShzBqq7k//uNaThpi+TrhC17W3DOELDeuusADwBpIUZb43hfzQ8F1VWsJc3cUQEakfm+8qe0PZa1RY3toYditTfWGRn8= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 02:19:48 localhost python3[23691]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Nov 23 02:19:49 localhost python3[23705]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Nov 23 02:19:50 localhost python3[23720]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005532600.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-26f6-5ab9-000000000022-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:19:50 localhost python3[23740]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-26f6-5ab9-000000000023-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:19:50 localhost systemd[1]: Starting Hostname Service... Nov 23 02:19:50 localhost systemd[1]: Started Hostname Service. Nov 23 02:19:50 localhost systemd-hostnamed[23744]: Hostname set to (static) Nov 23 02:19:50 localhost NetworkManager[5966]: [1763882390.9813] hostname: static hostname changed from "np0005532600.novalocal" to "np0005532600.ooo.test" Nov 23 02:19:50 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Nov 23 02:19:50 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Nov 23 02:19:52 localhost systemd[1]: session-10.scope: Deactivated successfully. Nov 23 02:19:52 localhost systemd[1]: session-10.scope: Consumed 1min 46.090s CPU time. Nov 23 02:19:52 localhost systemd-logind[760]: Session 10 logged out. Waiting for processes to exit. Nov 23 02:19:52 localhost systemd-logind[760]: Removed session 10. Nov 23 02:19:53 localhost sshd[23755]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:19:53 localhost systemd-logind[760]: New session 11 of user zuul. Nov 23 02:19:53 localhost systemd[1]: Started Session 11 of User zuul. Nov 23 02:19:53 localhost python3[23772]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Nov 23 02:19:57 localhost systemd[1]: session-11.scope: Deactivated successfully. Nov 23 02:19:57 localhost systemd-logind[760]: Session 11 logged out. Waiting for processes to exit. Nov 23 02:19:57 localhost systemd-logind[760]: Removed session 11. Nov 23 02:20:01 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Nov 23 02:20:02 localhost sshd[23775]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:20:02 localhost systemd-logind[760]: New session 12 of user zuul. Nov 23 02:20:02 localhost systemd[1]: Started Session 12 of User zuul. Nov 23 02:20:03 localhost python3[23794]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:20:11 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Nov 23 02:20:11 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Nov 23 02:20:11 localhost dbus-broker-launch[18415]: Noticed file-system modification, trigger reload. Nov 23 02:20:11 localhost dbus-broker-launch[18415]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Nov 23 02:20:11 localhost dbus-broker-launch[18415]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Nov 23 02:20:11 localhost dbus-broker-launch[18415]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Nov 23 02:20:11 localhost systemd[1]: Reloading. Nov 23 02:20:11 localhost systemd-rc-local-generator[23899]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:20:11 localhost systemd-sysv-generator[23902]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:20:11 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:20:11 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Nov 23 02:20:20 localhost kernel: SELinux: Converting 537 SID table entries... Nov 23 02:20:20 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:20:20 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:20:20 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:20:20 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:20:20 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:20:20 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:20:20 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:20:21 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=5 res=1 Nov 23 02:20:21 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 23 02:20:21 localhost systemd[1]: Stopping OpenSSH server daemon... Nov 23 02:20:21 localhost systemd[1]: sshd.service: Deactivated successfully. Nov 23 02:20:21 localhost systemd[1]: Stopped OpenSSH server daemon. Nov 23 02:20:21 localhost systemd[1]: sshd.service: Consumed 1.186s CPU time. Nov 23 02:20:21 localhost systemd[1]: Stopped target sshd-keygen.target. Nov 23 02:20:21 localhost systemd[1]: Stopping sshd-keygen.target... Nov 23 02:20:21 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:20:21 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:20:21 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:20:21 localhost systemd[1]: Reached target sshd-keygen.target. Nov 23 02:20:21 localhost systemd[1]: Starting OpenSSH server daemon... Nov 23 02:20:21 localhost sshd[23933]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:20:21 localhost systemd[1]: Started OpenSSH server daemon. Nov 23 02:20:22 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 23 02:20:22 localhost systemd[1]: Starting man-db-cache-update.service... Nov 23 02:20:22 localhost systemd[1]: Reloading. Nov 23 02:20:22 localhost systemd-rc-local-generator[24497]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:20:22 localhost systemd-sysv-generator[24501]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:20:22 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:20:22 localhost systemd[1]: Queuing reload/restart jobs for marked units… Nov 23 02:20:23 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 23 02:20:24 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 23 02:20:24 localhost systemd[1]: Finished man-db-cache-update.service. Nov 23 02:20:24 localhost systemd[1]: man-db-cache-update.service: Consumed 1.615s CPU time. Nov 23 02:20:24 localhost systemd[1]: run-r6e4eca188538483b9cee39afa79d93f1.service: Deactivated successfully. Nov 23 02:20:24 localhost systemd[1]: run-rbc15ce928a9f42d4b34a06d49cc999d5.service: Deactivated successfully. Nov 23 02:21:24 localhost systemd[1]: session-12.scope: Deactivated successfully. Nov 23 02:21:24 localhost systemd[1]: session-12.scope: Consumed 17.609s CPU time. Nov 23 02:21:24 localhost systemd-logind[760]: Session 12 logged out. Waiting for processes to exit. Nov 23 02:21:24 localhost systemd-logind[760]: Removed session 12. Nov 23 02:22:29 localhost sshd[25896]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:22:29 localhost systemd-logind[760]: New session 13 of user zuul. Nov 23 02:22:29 localhost systemd[1]: Started Session 13 of User zuul. Nov 23 02:22:30 localhost python3[25947]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:22:30 localhost python3[25992]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1763882549.7633207-62-259165016781194/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:22:35 localhost python3[26022]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:22:37 localhost python3[26040]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:22:47 localhost sshd[26041]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:23:19 localhost sshd[26043]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:23:37 localhost systemd[1]: session-13.scope: Deactivated successfully. Nov 23 02:23:37 localhost systemd[1]: session-13.scope: Consumed 1.124s CPU time. Nov 23 02:23:37 localhost systemd-logind[760]: Session 13 logged out. Waiting for processes to exit. Nov 23 02:23:37 localhost systemd-logind[760]: Removed session 13. Nov 23 02:26:52 localhost sshd[26046]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:27:17 localhost sshd[26048]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:27:21 localhost sshd[26050]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:27:53 localhost sshd[26052]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:28:20 localhost sshd[26054]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:29:38 localhost sshd[26056]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:29:49 localhost sshd[26058]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:30:10 localhost sshd[26060]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:31:59 localhost sshd[26063]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:32:05 localhost sshd[26065]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:32:27 localhost sshd[26068]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:33:39 localhost sshd[26071]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:34:35 localhost sshd[26073]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:34:51 localhost sshd[26075]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:35:19 localhost sshd[26076]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:36:58 localhost sshd[26079]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:37:02 localhost sshd[26081]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:37:18 localhost sshd[26083]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:38:36 localhost sshd[26085]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:38:40 localhost sshd[26087]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:39:36 localhost sshd[26089]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:39:48 localhost sshd[26090]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:40:20 localhost sshd[26093]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:42:00 localhost sshd[26096]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:42:03 localhost sshd[26098]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:42:14 localhost sshd[26101]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:43:51 localhost sshd[26103]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:44:42 localhost sshd[26105]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:45:36 localhost sshd[26108]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:46:57 localhost sshd[26111]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:47:05 localhost sshd[26113]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:47:17 localhost sshd[26115]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:49:03 localhost sshd[26117]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:49:33 localhost sshd[26119]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:49:52 localhost sshd[26121]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:50:46 localhost sshd[26125]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:50:56 localhost sshd[26128]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:50:56 localhost systemd-logind[760]: New session 14 of user zuul. Nov 23 02:50:56 localhost systemd[1]: Started Session 14 of User zuul. Nov 23 02:50:57 localhost python3[26176]: ansible-ansible.legacy.ping Invoked with data=pong Nov 23 02:50:58 localhost python3[26221]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 23 02:50:58 localhost python3[26241]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005532600.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Nov 23 02:50:58 localhost systemd-journald[618]: Field hash table of /run/log/journal/6e0090cd4cf296f54418e234b90f721c/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Nov 23 02:50:58 localhost systemd-journald[618]: /run/log/journal/6e0090cd4cf296f54418e234b90f721c/system.journal: Journal header limits reached or header out-of-date, rotating. Nov 23 02:50:58 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Nov 23 02:50:58 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Nov 23 02:50:59 localhost python3[26298]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:50:59 localhost python3[26341]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1763884259.1058085-81371-86139257518091/source _original_basename=tmp3epsqtm7 follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:00 localhost python3[26371]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:00 localhost python3[26387]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:01 localhost python3[26403]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:01 localhost python3[26419]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:02 localhost python3[26433]: ansible-ping Invoked with data=pong Nov 23 02:51:13 localhost sshd[26434]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:51:13 localhost systemd-logind[760]: New session 15 of user tripleo-admin. Nov 23 02:51:13 localhost systemd[1]: Created slice User Slice of UID 1002. Nov 23 02:51:13 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Nov 23 02:51:13 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Nov 23 02:51:13 localhost systemd[1]: Starting User Manager for UID 1002... Nov 23 02:51:14 localhost systemd[26438]: Queued start job for default target Main User Target. Nov 23 02:51:14 localhost systemd[26438]: Created slice User Application Slice. Nov 23 02:51:14 localhost systemd[26438]: Started Mark boot as successful after the user session has run 2 minutes. Nov 23 02:51:14 localhost systemd[26438]: Started Daily Cleanup of User's Temporary Directories. Nov 23 02:51:14 localhost systemd[26438]: Reached target Paths. Nov 23 02:51:14 localhost systemd[26438]: Reached target Timers. Nov 23 02:51:14 localhost systemd[26438]: Starting D-Bus User Message Bus Socket... Nov 23 02:51:14 localhost systemd[26438]: Starting Create User's Volatile Files and Directories... Nov 23 02:51:14 localhost systemd[26438]: Finished Create User's Volatile Files and Directories. Nov 23 02:51:14 localhost systemd[26438]: Listening on D-Bus User Message Bus Socket. Nov 23 02:51:14 localhost systemd[26438]: Reached target Sockets. Nov 23 02:51:14 localhost systemd[26438]: Reached target Basic System. Nov 23 02:51:14 localhost systemd[26438]: Reached target Main User Target. Nov 23 02:51:14 localhost systemd[26438]: Startup finished in 119ms. Nov 23 02:51:14 localhost systemd[1]: Started User Manager for UID 1002. Nov 23 02:51:14 localhost systemd[1]: Started Session 15 of User tripleo-admin. Nov 23 02:51:14 localhost python3[26498]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Nov 23 02:51:19 localhost python3[26518]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Nov 23 02:51:20 localhost python3[26534]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Nov 23 02:51:20 localhost python3[26582]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.ohxnw7ketmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:21 localhost python3[26612]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.ohxnw7ketmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:22 localhost python3[26628]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.ohxnw7ketmphosts insertbefore=BOF block=172.17.0.106 np0005532603.ooo.test np0005532603#012172.18.0.106 np0005532603.storage.ooo.test np0005532603.storage#012172.17.0.106 np0005532603.internalapi.ooo.test np0005532603.internalapi#012172.19.0.106 np0005532603.tenant.ooo.test np0005532603.tenant#012192.168.122.106 np0005532603.ctlplane.ooo.test np0005532603.ctlplane#012172.17.0.107 np0005532604.ooo.test np0005532604#012172.18.0.107 np0005532604.storage.ooo.test np0005532604.storage#012172.17.0.107 np0005532604.internalapi.ooo.test np0005532604.internalapi#012172.19.0.107 np0005532604.tenant.ooo.test np0005532604.tenant#012192.168.122.107 np0005532604.ctlplane.ooo.test np0005532604.ctlplane#012172.17.0.108 np0005532605.ooo.test np0005532605#012172.18.0.108 np0005532605.storage.ooo.test np0005532605.storage#012172.17.0.108 np0005532605.internalapi.ooo.test np0005532605.internalapi#012172.19.0.108 np0005532605.tenant.ooo.test np0005532605.tenant#012192.168.122.108 np0005532605.ctlplane.ooo.test np0005532605.ctlplane#012172.17.0.103 np0005532600.ooo.test np0005532600#012172.18.0.103 np0005532600.storage.ooo.test np0005532600.storage#012172.20.0.103 np0005532600.storagemgmt.ooo.test np0005532600.storagemgmt#012172.17.0.103 np0005532600.internalapi.ooo.test np0005532600.internalapi#012172.19.0.103 np0005532600.tenant.ooo.test np0005532600.tenant#012172.21.0.103 np0005532600.external.ooo.test np0005532600.external#012192.168.122.103 np0005532600.ctlplane.ooo.test np0005532600.ctlplane#012172.17.0.104 np0005532601.ooo.test np0005532601#012172.18.0.104 np0005532601.storage.ooo.test np0005532601.storage#012172.20.0.104 np0005532601.storagemgmt.ooo.test np0005532601.storagemgmt#012172.17.0.104 np0005532601.internalapi.ooo.test np0005532601.internalapi#012172.19.0.104 np0005532601.tenant.ooo.test np0005532601.tenant#012172.21.0.104 np0005532601.external.ooo.test np0005532601.external#012192.168.122.104 np0005532601.ctlplane.ooo.test np0005532601.ctlplane#012172.17.0.105 np0005532602.ooo.test np0005532602#012172.18.0.105 np0005532602.storage.ooo.test np0005532602.storage#012172.20.0.105 np0005532602.storagemgmt.ooo.test np0005532602.storagemgmt#012172.17.0.105 np0005532602.internalapi.ooo.test np0005532602.internalapi#012172.19.0.105 np0005532602.tenant.ooo.test np0005532602.tenant#012172.21.0.105 np0005532602.external.ooo.test np0005532602.external#012192.168.122.105 np0005532602.ctlplane.ooo.test np0005532602.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.232 overcloud.storage.ooo.test#012172.20.0.179 overcloud.storagemgmt.ooo.test#012172.17.0.154 overcloud.internalapi.ooo.test#012172.21.0.216 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:22 localhost python3[26644]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.ohxnw7ketmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:51:23 localhost python3[26661]: ansible-file Invoked with path=/tmp/ansible.ohxnw7ketmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:51:24 localhost python3[26677]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:51:24 localhost python3[26694]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:51:29 localhost python3[26714]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:51:30 localhost python3[26731]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:51:45 localhost systemd[1]: Reloading. Nov 23 02:51:45 localhost systemd-rc-local-generator[26930]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:51:45 localhost systemd-sysv-generator[26933]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:51:45 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:51:45 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Nov 23 02:51:53 localhost systemd[1]: Reloading. Nov 23 02:51:53 localhost sshd[27004]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:51:53 localhost systemd-sysv-generator[26997]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:51:53 localhost systemd-rc-local-generator[26993]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:51:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:51:53 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Nov 23 02:51:53 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Nov 23 02:51:53 localhost systemd[1]: Reloading. Nov 23 02:51:54 localhost systemd-sysv-generator[27044]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:51:54 localhost systemd-rc-local-generator[27039]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:51:54 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:51:54 localhost systemd[1]: Listening on LVM2 poll daemon socket. Nov 23 02:51:59 localhost sshd[27760]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:52:26 localhost sshd[27892]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:52:43 localhost kernel: SELinux: Converting 2712 SID table entries... Nov 23 02:52:43 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:52:43 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:52:43 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:52:43 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:52:43 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:52:43 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:52:43 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:52:43 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=7 res=1 Nov 23 02:52:43 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 23 02:52:43 localhost systemd[1]: Starting man-db-cache-update.service... Nov 23 02:52:43 localhost systemd[1]: Reloading. Nov 23 02:52:44 localhost systemd-rc-local-generator[28081]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:52:44 localhost systemd-sysv-generator[28087]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:52:44 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:52:44 localhost systemd[1]: Queuing reload/restart jobs for marked units… Nov 23 02:52:44 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 23 02:52:44 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 23 02:52:44 localhost systemd[1]: Finished man-db-cache-update.service. Nov 23 02:52:44 localhost systemd[1]: run-r2e4077f79c314831af7018578b5a403a.service: Deactivated successfully. Nov 23 02:52:44 localhost systemd[1]: run-r798710653f4b430b9adc8f567f870d4a.service: Deactivated successfully. Nov 23 02:52:45 localhost python3[28929]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:52:47 localhost python3[29068]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:52:47 localhost systemd[1]: Reloading. Nov 23 02:52:47 localhost systemd-rc-local-generator[29095]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:52:47 localhost systemd-sysv-generator[29100]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:52:47 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:52:49 localhost python3[29122]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:52:49 localhost python3[29138]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:52:50 localhost python3[29155]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Nov 23 02:52:50 localhost python3[29173]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:52:51 localhost python3[29191]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:52:51 localhost python3[29209]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 02:52:51 localhost systemd[1]: Reloading Network Manager... Nov 23 02:52:51 localhost NetworkManager[5966]: [1763884371.7804] audit: op="reload" arg="0" pid=29212 uid=0 result="success" Nov 23 02:52:51 localhost NetworkManager[5966]: [1763884371.7815] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Nov 23 02:52:51 localhost NetworkManager[5966]: [1763884371.7816] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Nov 23 02:52:51 localhost systemd[1]: Reloaded Network Manager. Nov 23 02:52:53 localhost python3[29228]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:52:54 localhost python3[29245]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:52:55 localhost python3[29263]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:52:55 localhost python3[29279]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:52:56 localhost python3[29295]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Nov 23 02:52:56 localhost python3[29311]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:52:57 localhost python3[29327]: ansible-blockinfile Invoked with path=/tmp/ansible.5u4s8iwd block=[192.168.122.106]*,[np0005532603.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005532603.internalapi.ooo.test]*,[172.18.0.106]*,[np0005532603.storage.ooo.test]*,[172.19.0.106]*,[np0005532603.tenant.ooo.test]*,[np0005532603.ooo.test]*,[np0005532603]* ssh-rsa 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#012[192.168.122.107]*,[np0005532604.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005532604.internalapi.ooo.test]*,[172.18.0.107]*,[np0005532604.storage.ooo.test]*,[172.19.0.107]*,[np0005532604.tenant.ooo.test]*,[np0005532604.ooo.test]*,[np0005532604]* ssh-rsa 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#012[192.168.122.108]*,[np0005532605.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005532605.internalapi.ooo.test]*,[172.18.0.108]*,[np0005532605.storage.ooo.test]*,[172.19.0.108]*,[np0005532605.tenant.ooo.test]*,[np0005532605.ooo.test]*,[np0005532605]* ssh-rsa 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#012[192.168.122.103]*,[np0005532600.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005532600.external.ooo.test]*,[172.17.0.103]*,[np0005532600.internalapi.ooo.test]*,[172.18.0.103]*,[np0005532600.storage.ooo.test]*,[172.20.0.103]*,[np0005532600.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005532600.tenant.ooo.test]*,[np0005532600.ooo.test]*,[np0005532600]* ssh-rsa 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#012[192.168.122.104]*,[np0005532601.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005532601.external.ooo.test]*,[172.17.0.104]*,[np0005532601.internalapi.ooo.test]*,[172.18.0.104]*,[np0005532601.storage.ooo.test]*,[172.20.0.104]*,[np0005532601.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005532601.tenant.ooo.test]*,[np0005532601.ooo.test]*,[np0005532601]* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDGbuxu5cll3+luI1us3cUDWAe8L27suF9z11tMNLFx00mLUQT0bRZo0bjTrVd3zjmo5AF+94UqNOk0apGNUoJhcgSRP2SJTW6DK967TRO+45iJk0EVOUraQNajqNSLPfQTFcMIFaR1S9VG8Tgo5unexepOKoK+IVGSnp7Lz7HU0lyv1cqowXSCilBeljkMImen993+Rxuw81iY5m+dm3JRFjbIHMhH1iyrmdvd7q76yb5rcgnZ/0IiC6ykmobt+8RJcWKvPkgDjlsV3HNR6Iep+mOgwZqmk8zYTxgktX1TNK2CPTcOKRWZDPbtqJCVp89RRw+Ga+XnVK8C/irsxVVFdqYEUCPqsH14pX46+pGJL2NHo9n7OC6KW9K/g4K/S7giuCzhfFBV/yrGzCbsx+XqABZhWQuYvnqhRL3IPoCfsXpR9EXT4w3PKxt8Z8a5+7x7kM9r00JTIGtAfnDL5qaKSdlhILg1SC0GkgKbcttrx1Cvo4uwMvKbh3Bmb9J5fRc=#012[192.168.122.105]*,[np0005532602.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005532602.external.ooo.test]*,[172.17.0.105]*,[np0005532602.internalapi.ooo.test]*,[172.18.0.105]*,[np0005532602.storage.ooo.test]*,[172.20.0.105]*,[np0005532602.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005532602.tenant.ooo.test]*,[np0005532602.ooo.test]*,[np0005532602]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:52:58 localhost python3[29343]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.5u4s8iwd' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:52:58 localhost python3[29361]: ansible-file Invoked with path=/tmp/ansible.5u4s8iwd state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:52:59 localhost python3[29377]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Nov 23 02:52:59 localhost python3[29393]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:52:59 localhost python3[29411]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:00 localhost python3[29430]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Nov 23 02:53:03 localhost python3[29567]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:03 localhost python3[29584]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:53:06 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Nov 23 02:53:07 localhost dbus-broker-launch[751]: Noticed file-system modification, trigger reload. Nov 23 02:53:07 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 23 02:53:07 localhost systemd[1]: Starting man-db-cache-update.service... Nov 23 02:53:07 localhost systemd[1]: Reloading. Nov 23 02:53:07 localhost systemd-rc-local-generator[29651]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:53:07 localhost systemd-sysv-generator[29655]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:53:07 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:53:07 localhost systemd[1]: Queuing reload/restart jobs for marked units… Nov 23 02:53:07 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Nov 23 02:53:07 localhost systemd[1]: tuned.service: Deactivated successfully. Nov 23 02:53:07 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Nov 23 02:53:07 localhost systemd[1]: tuned.service: Consumed 1.825s CPU time. Nov 23 02:53:07 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Nov 23 02:53:07 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 23 02:53:07 localhost systemd[1]: Finished man-db-cache-update.service. Nov 23 02:53:07 localhost systemd[1]: run-r523c32720a4248d383cee378d94a3a52.service: Deactivated successfully. Nov 23 02:53:08 localhost systemd[1]: Started Dynamic System Tuning Daemon. Nov 23 02:53:08 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Nov 23 02:53:08 localhost systemd[1]: Starting man-db-cache-update.service... Nov 23 02:53:09 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Nov 23 02:53:09 localhost systemd[1]: Finished man-db-cache-update.service. Nov 23 02:53:09 localhost systemd[1]: run-rbbae5676d50c42a2a513bac9c271ad80.service: Deactivated successfully. Nov 23 02:53:10 localhost python3[30029]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:53:10 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Nov 23 02:53:10 localhost systemd[1]: tuned.service: Deactivated successfully. Nov 23 02:53:10 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Nov 23 02:53:10 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Nov 23 02:53:11 localhost systemd[1]: Started Dynamic System Tuning Daemon. Nov 23 02:53:12 localhost python3[30224]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:12 localhost python3[30241]: ansible-slurp Invoked with src=/etc/tuned/active_profile Nov 23 02:53:13 localhost python3[30257]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:53:13 localhost python3[30273]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:15 localhost python3[30293]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:15 localhost python3[30310]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:53:17 localhost systemd[26438]: Starting Mark boot as successful... Nov 23 02:53:17 localhost systemd[26438]: Finished Mark boot as successful. Nov 23 02:53:18 localhost python3[30327]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:23 localhost python3[30343]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:24 localhost python3[30391]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:24 localhost python3[30436]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884403.7495692-86949-83628640214557/source _original_basename=tmpum5gqof4 follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:25 localhost python3[30466]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:25 localhost python3[30514]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:26 localhost python3[30557]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884405.4434714-87153-236522948786231/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=4eefa696485bbc620d23cfa2b984b7fdf5b94141 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:26 localhost python3[30619]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:27 localhost python3[30662]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884406.5097883-87304-41537741015387/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=d21c50bb0d1c3518e21781a91eecefa1b4005ab5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:27 localhost python3[30724]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:28 localhost python3[30767]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884407.4607136-87304-200928949931722/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=7ef549573e680933daa70e4a7422cfd06d40b66f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:29 localhost python3[30829]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:29 localhost python3[30872]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884408.484497-87304-189270605615829/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=58a6ffe95d92c6d1cd6a9c438fa59ae801d53929 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:30 localhost python3[30934]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:30 localhost python3[30977]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884409.7042117-87304-129554108684967/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:31 localhost python3[31039]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:31 localhost python3[31082]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884410.6828575-87304-270703462634713/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=abc294087e1f83cb7c935b68a3e924f8aff0692c backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:32 localhost python3[31144]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:32 localhost python3[31187]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884411.7135725-87304-171991747672484/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:33 localhost python3[31249]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:33 localhost python3[31292]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884412.6289248-87304-117433524551718/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=697ebc2ba81f3dc30022a81555b2ea0c43154258 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:33 localhost python3[31354]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:34 localhost python3[31397]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884413.6098132-87304-228781258769288/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:34 localhost python3[31459]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:35 localhost python3[31502]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884414.5880136-87304-127972668445223/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:35 localhost python3[31564]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:36 localhost python3[31607]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884415.503575-87304-49594063245530/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=64faaf107735e8654a4a880187966c1b70b28e40 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:36 localhost python3[31637]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:53:37 localhost python3[31685]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:53:37 localhost python3[31728]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884417.1478293-88816-65826534731166/source _original_basename=tmpeo3_dm71 follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:53:42 localhost python3[31758]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Nov 23 02:53:42 localhost python3[31819]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:47 localhost python3[31836]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:52 localhost python3[31853]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:53 localhost python3[31876]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:53 localhost python3[31899]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:54 localhost python3[31922]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:54 localhost python3[31945]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:53:55 localhost python3[31968]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:54:06 localhost sshd[31976]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:54:19 localhost sshd[31978]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:54:28 localhost sshd[31980]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:54:45 localhost python3[31996]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:46 localhost python3[32044]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:46 localhost python3[32062]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmpo_8wsje5 recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:46 localhost python3[32092]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:47 localhost python3[32140]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:47 localhost python3[32158]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:48 localhost python3[32220]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:48 localhost python3[32238]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:49 localhost python3[32300]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:49 localhost python3[32318]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:50 localhost python3[32380]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:50 localhost python3[32398]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:51 localhost python3[32460]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:51 localhost python3[32478]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:52 localhost python3[32540]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:52 localhost python3[32558]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:53 localhost python3[32620]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:53 localhost python3[32638]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:53 localhost python3[32700]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:54 localhost python3[32718]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:54 localhost python3[32780]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:54 localhost python3[32798]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:55 localhost python3[32860]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:55 localhost python3[32878]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:56 localhost python3[32940]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:56 localhost python3[32958]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:54:57 localhost python3[32988]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:54:57 localhost python3[33036]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:54:58 localhost python3[33054]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmpt1c8srl_ recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:00 localhost python3[33084]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:55:05 localhost python3[33101]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:55:05 localhost python3[33119]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:55:05 localhost python3[33137]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:55:06 localhost systemd[1]: Reloading. Nov 23 02:55:06 localhost systemd-rc-local-generator[33166]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:55:06 localhost systemd-sysv-generator[33170]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:55:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:55:06 localhost systemd[1]: Starting Netfilter Tables... Nov 23 02:55:06 localhost systemd[1]: Finished Netfilter Tables. Nov 23 02:55:07 localhost python3[33227]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:07 localhost python3[33270]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884506.6537557-92850-95026646279244/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:07 localhost python3[33300]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:55:08 localhost python3[33318]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:55:09 localhost python3[33367]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:09 localhost python3[33410]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884508.6212504-93140-55442567137406/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:10 localhost python3[33472]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:10 localhost python3[33515]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884509.7221947-93270-48529123595245/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:11 localhost python3[33577]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:11 localhost python3[33620]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884510.857257-93434-11390899950830/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:12 localhost python3[33682]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:12 localhost python3[33725]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884511.9715924-93589-124724842540773/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:14 localhost python3[33787]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:15 localhost python3[33830]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884513.042083-93729-115557546476648/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:15 localhost python3[33860]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:55:16 localhost python3[33925]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:16 localhost python3[33942]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:55:17 localhost python3[33959]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:55:17 localhost python3[33978]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:17 localhost python3[33994]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Nov 23 02:55:18 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=8 res=1 Nov 23 02:55:19 localhost python3[34014]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:19 localhost python3[34030]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:19 localhost python3[34046]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Nov 23 02:55:20 localhost kernel: SELinux: Converting 2716 SID table entries... Nov 23 02:55:20 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:55:20 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:55:20 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:55:20 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:55:20 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:55:20 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:55:20 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:55:20 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=9 res=1 Nov 23 02:55:21 localhost python3[34069]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:21 localhost python3[34085]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:21 localhost python3[34101]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:22 localhost python3[34117]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:22 localhost python3[34133]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:55:25 localhost python3[34150]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Nov 23 02:55:26 localhost python3[34167]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Nov 23 02:55:26 localhost kernel: loop: module loaded Nov 23 02:55:26 localhost kernel: loop0: detected capacity change from 0 to 41943040 Nov 23 02:55:26 localhost python3[34192]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Nov 23 02:55:26 localhost lvm[34196]: PV /dev/loop0 not used. Nov 23 02:55:26 localhost lvm[34198]: PV /dev/loop0 online, VG cinder-volumes is complete. Nov 23 02:55:27 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Nov 23 02:55:27 localhost lvm[34200]: 0 logical volume(s) in volume group "cinder-volumes" now active Nov 23 02:55:27 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Nov 23 02:55:27 localhost python3[34248]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:27 localhost python3[34291]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884527.1574087-94746-53544807417860/source _original_basename=tmpnqzzhar0 follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:28 localhost python3[34321]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Nov 23 02:55:28 localhost systemd[1]: Reloading. Nov 23 02:55:28 localhost systemd-rc-local-generator[34352]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:55:28 localhost systemd-sysv-generator[34356]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:55:28 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:55:28 localhost systemd[1]: Reloading. Nov 23 02:55:28 localhost systemd-rc-local-generator[34383]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:55:28 localhost systemd-sysv-generator[34386]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:55:28 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:55:29 localhost python3[34411]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:29 localhost python3[34427]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:30 localhost python3[34443]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:30 localhost python3[34459]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:30 localhost python3[34475]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:31 localhost python3[34491]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:31 localhost python3[34507]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:36 localhost python3[34653]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:37 localhost python3[34669]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:37 localhost python3[34685]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:37 localhost python3[34701]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:38 localhost python3[34717]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:38 localhost python3[34733]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:38 localhost python3[34749]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:39 localhost python3[34765]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:39 localhost python3[34781]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:40 localhost python3[34829]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:40 localhost python3[34872]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884539.7220078-95652-9744885384368/source _original_basename=tmp55cd5jji follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:55:41 localhost python3[34902]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Nov 23 02:55:41 localhost kernel: SELinux: Converting 2720 SID table entries... Nov 23 02:55:41 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:55:41 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:55:41 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:55:41 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:55:41 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:55:41 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:55:41 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:55:42 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=10 res=1 Nov 23 02:55:42 localhost python3[34982]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Nov 23 02:55:43 localhost kernel: SELinux: Converting 2720 SID table entries... Nov 23 02:55:43 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:55:43 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:55:43 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:55:43 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:55:43 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:55:43 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:55:43 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:55:43 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=11 res=1 Nov 23 02:55:43 localhost python3[35003]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Nov 23 02:55:44 localhost kernel: SELinux: Converting 2720 SID table entries... Nov 23 02:55:44 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:55:44 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:55:44 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:55:44 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:55:44 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:55:44 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:55:44 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:55:44 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=12 res=1 Nov 23 02:55:44 localhost python3[35024]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:45 localhost python3[35040]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:45 localhost python3[35056]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:45 localhost python3[35072]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:55:46 localhost python3[35088]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:55:47 localhost python3[35105]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:55:47 localhost sshd[35107]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:55:50 localhost python3[35124]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:51 localhost python3[35172]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:51 localhost python3[35215]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884551.091155-96727-173094673559844/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:52 localhost python3[35245]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 02:55:53 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 23 02:55:53 localhost systemd[1]: Stopped Load Kernel Modules. Nov 23 02:55:53 localhost systemd[1]: Stopping Load Kernel Modules... Nov 23 02:55:53 localhost systemd[1]: Starting Load Kernel Modules... Nov 23 02:55:53 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 23 02:55:53 localhost kernel: Bridge firewalling registered Nov 23 02:55:53 localhost systemd-modules-load[35248]: Inserted module 'br_netfilter' Nov 23 02:55:53 localhost systemd-modules-load[35248]: Module 'msr' is built in Nov 23 02:55:53 localhost systemd[1]: Finished Load Kernel Modules. Nov 23 02:55:54 localhost python3[35299]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:55:54 localhost python3[35342]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884553.7231367-96901-158331382965564/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Nov 23 02:55:54 localhost python3[35372]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:55 localhost python3[35390]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:55 localhost python3[35408]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:55 localhost python3[35425]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:56 localhost python3[35442]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:56 localhost python3[35459]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:56 localhost python3[35477]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:57 localhost python3[35495]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:57 localhost python3[35513]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:57 localhost python3[35531]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:58 localhost python3[35549]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:58 localhost python3[35567]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:58 localhost python3[35585]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:58 localhost python3[35602]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:59 localhost python3[35619]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:59 localhost python3[35636]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:55:59 localhost python3[35653]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Nov 23 02:56:01 localhost python3[35671]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 02:56:01 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 23 02:56:01 localhost systemd[1]: Stopped Apply Kernel Variables. Nov 23 02:56:01 localhost systemd[1]: Stopping Apply Kernel Variables... Nov 23 02:56:01 localhost systemd[1]: Starting Apply Kernel Variables... Nov 23 02:56:01 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 23 02:56:01 localhost systemd[1]: Finished Apply Kernel Variables. Nov 23 02:56:01 localhost python3[35691]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:02 localhost python3[35707]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:02 localhost python3[35723]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:56:02 localhost python3[35739]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:56:03 localhost python3[35755]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:56:03 localhost python3[35771]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:03 localhost python3[35787]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:04 localhost python3[35803]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:04 localhost python3[35819]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:04 localhost python3[35835]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:05 localhost python3[35851]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:05 localhost python3[35867]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:06 localhost python3[35883]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:06 localhost python3[35899]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:06 localhost python3[35915]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:07 localhost python3[35931]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:07 localhost python3[35947]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:07 localhost python3[35963]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:08 localhost python3[35979]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:08 localhost python3[35995]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:08 localhost python3[36011]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:09 localhost python3[36027]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:09 localhost python3[36043]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:09 localhost python3[36059]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Nov 23 02:56:10 localhost python3[36081]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005532600.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Nov 23 02:56:10 localhost python3[36105]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Nov 23 02:56:11 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=13 res=1 Nov 23 02:56:11 localhost python3[36125]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:12 localhost python3[36141]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:12 localhost python3[36157]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:12 localhost python3[36173]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:13 localhost python3[36221]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:13 localhost python3[36264]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884573.1195958-98413-273516320923991/source _original_basename=tmpigvhdkmp follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:14 localhost python3[36326]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:14 localhost python3[36369]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884574.0980363-98512-107521011260049/source _original_basename=tmpzafv72_l follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:15 localhost python3[36399]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Nov 23 02:56:15 localhost systemd[1]: Reloading. Nov 23 02:56:15 localhost systemd-rc-local-generator[36426]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:56:15 localhost systemd-sysv-generator[36431]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:56:15 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:56:16 localhost python3[36453]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:16 localhost python3[36469]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:17 localhost python3[36485]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 02:56:17 localhost systemd[1]: Stopping User Login Management... Nov 23 02:56:17 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Nov 23 02:56:17 localhost systemd[1]: Stopped User Login Management. Nov 23 02:56:17 localhost systemd[1]: Starting Load Kernel Module drm... Nov 23 02:56:17 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 23 02:56:17 localhost systemd[1]: Finished Load Kernel Module drm. Nov 23 02:56:17 localhost systemd[1]: Starting User Login Management... Nov 23 02:56:17 localhost systemd-logind[36493]: New seat seat0. Nov 23 02:56:17 localhost systemd-logind[36493]: Watching system buttons on /dev/input/event0 (Power Button) Nov 23 02:56:17 localhost systemd-logind[36493]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Nov 23 02:56:17 localhost systemd[1]: Started User Login Management. Nov 23 02:56:17 localhost systemd-logind[36493]: New session 14 of user zuul. Nov 23 02:56:17 localhost systemd-logind[36493]: New session 15 of user tripleo-admin. Nov 23 02:56:17 localhost systemd[26438]: Created slice User Background Tasks Slice. Nov 23 02:56:17 localhost systemd[26438]: Starting Cleanup of User's Temporary Files and Directories... Nov 23 02:56:17 localhost systemd[26438]: Finished Cleanup of User's Temporary Files and Directories. Nov 23 02:56:17 localhost python3[36509]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:18 localhost python3[36526]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:18 localhost python3[36542]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Nov 23 02:56:19 localhost kernel: SELinux: Converting 2720 SID table entries... Nov 23 02:56:19 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:56:19 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:56:19 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:56:19 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:56:19 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:56:19 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:56:19 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:56:19 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=14 res=1 Nov 23 02:56:19 localhost python3[36563]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:20 localhost python3[36579]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:20 localhost python3[36595]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:56:21 localhost python3[36613]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:56:24 localhost python3[36630]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Nov 23 02:56:25 localhost python3[36691]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:25 localhost python3[36707]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:56:25 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Nov 23 02:56:26 localhost python3[36767]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:26 localhost python3[36810]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884585.755999-99285-220815767785597/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=6447c7c1da3d3c0aa38b0f0f0bd8f9018c8cbf91 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:27 localhost python3[36872]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:27 localhost python3[36917]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884586.8504086-99383-280282529065606/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:28 localhost python3[36947]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:28 localhost python3[36963]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:28 localhost python3[36979]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:29 localhost python3[36995]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:30 localhost python3[37043]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:30 localhost python3[37086]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884589.6919503-99621-145163814405981/source _original_basename=tmpwdaq878c follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:30 localhost python3[37116]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:31 localhost python3[37132]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:31 localhost python3[37148]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:32 localhost python3[37196]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:32 localhost python3[37239]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884591.7053597-99821-165712947852304/source _original_basename=tmp91k7_mgz follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:33 localhost python3[37269]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:33 localhost python3[37285]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:34 localhost python3[37301]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:56:37 localhost python3[37350]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:37 localhost python3[37395]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884597.229283-100261-125308542140817/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:38 localhost python3[37426]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:56:38 localhost systemd[1]: Stopping OpenSSH server daemon... Nov 23 02:56:38 localhost systemd[1]: sshd.service: Deactivated successfully. Nov 23 02:56:38 localhost systemd[1]: Stopped OpenSSH server daemon. Nov 23 02:56:38 localhost systemd[1]: sshd.service: Consumed 1.484s CPU time, read 0B from disk, written 4.0K to disk. Nov 23 02:56:38 localhost systemd[1]: Stopped target sshd-keygen.target. Nov 23 02:56:38 localhost systemd[1]: Stopping sshd-keygen.target... Nov 23 02:56:38 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:56:38 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:56:38 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:56:38 localhost systemd[1]: Reached target sshd-keygen.target. Nov 23 02:56:38 localhost systemd[1]: Starting OpenSSH server daemon... Nov 23 02:56:38 localhost sshd[37430]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:56:38 localhost systemd[1]: Started OpenSSH server daemon. Nov 23 02:56:39 localhost python3[37446]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:39 localhost python3[37462]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:39 localhost python3[37478]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:39 localhost python3[37494]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:40 localhost python3[37510]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:40 localhost python3[37526]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:56:41 localhost python3[37542]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:42 localhost python3[37558]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:56:42 localhost python3[37576]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:56:43 localhost python3[37594]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:56:46 localhost python3[37643]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:47 localhost python3[37688]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884606.4876492-100841-227701782265085/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:48 localhost python3[37718]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:56:48 localhost python3[37736]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 02:56:48 localhost chronyd[766]: chronyd exiting Nov 23 02:56:48 localhost systemd[1]: Stopping NTP client/server... Nov 23 02:56:48 localhost systemd[1]: chronyd.service: Deactivated successfully. Nov 23 02:56:48 localhost systemd[1]: Stopped NTP client/server. Nov 23 02:56:48 localhost systemd[1]: chronyd.service: Consumed 122ms CPU time, read 1.9M from disk, written 4.0K to disk. Nov 23 02:56:48 localhost systemd[1]: Starting NTP client/server... Nov 23 02:56:48 localhost chronyd[37743]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Nov 23 02:56:48 localhost chronyd[37743]: Frequency -30.170 +/- 0.126 ppm read from /var/lib/chrony/drift Nov 23 02:56:48 localhost chronyd[37743]: Loaded seccomp filter (level 2) Nov 23 02:56:48 localhost systemd[1]: Started NTP client/server. Nov 23 02:56:49 localhost python3[37792]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:56:49 localhost python3[37835]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884608.9778047-100971-54358983307944/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:56:50 localhost python3[37865]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:56:50 localhost systemd[1]: Reloading. Nov 23 02:56:50 localhost systemd-rc-local-generator[37888]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:56:50 localhost systemd-sysv-generator[37894]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:56:50 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:56:51 localhost systemd[1]: Reloading. Nov 23 02:56:51 localhost systemd-rc-local-generator[37925]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:56:51 localhost systemd-sysv-generator[37928]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:56:51 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:56:51 localhost systemd[1]: Starting chronyd online sources service... Nov 23 02:56:51 localhost chronyc[37940]: 200 OK Nov 23 02:56:51 localhost systemd[1]: chrony-online.service: Deactivated successfully. Nov 23 02:56:51 localhost systemd[1]: Finished chronyd online sources service. Nov 23 02:56:52 localhost python3[37956]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:56:52 localhost chronyd[37743]: System clock was stepped by 0.000000 seconds Nov 23 02:56:52 localhost python3[37973]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:56:53 localhost chronyd[37743]: Selected source 54.39.23.64 (pool.ntp.org) Nov 23 02:56:54 localhost sshd[37975]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:57:02 localhost python3[37992]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:57:02 localhost chronyd[37743]: System clock was stepped by -0.000000 seconds Nov 23 02:57:03 localhost python3[38009]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:57:03 localhost python3[38026]: ansible-timezone Invoked with name=UTC hwclock=None Nov 23 02:57:03 localhost systemd[1]: Starting Time & Date Service... Nov 23 02:57:03 localhost systemd[1]: Started Time & Date Service. Nov 23 02:57:04 localhost python3[38046]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:57:05 localhost python3[38063]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:57:05 localhost python3[38080]: ansible-slurp Invoked with src=/etc/tuned/active_profile Nov 23 02:57:06 localhost python3[38096]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:57:07 localhost python3[38112]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Nov 23 02:57:07 localhost python3[38128]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Nov 23 02:57:08 localhost python3[38144]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Nov 23 02:57:08 localhost python3[38160]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:57:08 localhost python3[38176]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:57:09 localhost python3[38192]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Nov 23 02:57:09 localhost kernel: SELinux: Converting 2722 SID table entries... Nov 23 02:57:09 localhost kernel: SELinux: policy capability network_peer_controls=1 Nov 23 02:57:09 localhost kernel: SELinux: policy capability open_perms=1 Nov 23 02:57:09 localhost kernel: SELinux: policy capability extended_socket_class=1 Nov 23 02:57:09 localhost kernel: SELinux: policy capability always_check_network=0 Nov 23 02:57:09 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Nov 23 02:57:09 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 23 02:57:09 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Nov 23 02:57:10 localhost dbus-broker-launch[755]: avc: op=load_policy lsm=selinux seqno=15 res=1 Nov 23 02:57:10 localhost python3[38213]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Nov 23 02:57:12 localhost python3[38350]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': 'xTiPDdgBREcNB6aQMhLR9RhXh', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1763884036'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1763884036'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Nov 23 02:57:12 localhost rsyslogd[759]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Nov 23 02:57:12 localhost python3[38366]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Nov 23 02:57:13 localhost python3[38382]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Nov 23 02:57:13 localhost python3[38398]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Nov 23 02:57:14 localhost rsyslogd[759]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Nov 23 02:57:22 localhost python3[38415]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:57:24 localhost python3[38431]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005532600.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Nov 23 02:57:25 localhost python3[38453]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:57:25 localhost python3[38469]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Nov 23 02:57:26 localhost systemd[1]: Reloading. Nov 23 02:57:26 localhost systemd-rc-local-generator[38500]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:57:26 localhost systemd-sysv-generator[38506]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:57:26 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:57:26 localhost chronyd[37743]: chronyd exiting Nov 23 02:57:26 localhost systemd[1]: Stopping NTP client/server... Nov 23 02:57:26 localhost systemd[1]: chronyd.service: Deactivated successfully. Nov 23 02:57:26 localhost systemd[1]: Stopped NTP client/server. Nov 23 02:57:26 localhost systemd[1]: Starting NTP client/server... Nov 23 02:57:26 localhost chronyd[38519]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Nov 23 02:57:26 localhost chronyd[38519]: Frequency -30.170 +/- 0.132 ppm read from /var/lib/chrony/drift Nov 23 02:57:26 localhost chronyd[38519]: Loaded seccomp filter (level 2) Nov 23 02:57:26 localhost systemd[1]: Started NTP client/server. Nov 23 02:57:29 localhost sshd[38523]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:57:30 localhost chronyd[38519]: Selected source 54.39.23.64 (pool.ntp.org) Nov 23 02:57:33 localhost python3[38541]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005532600.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Nov 23 02:57:33 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Nov 23 02:57:34 localhost python3[38565]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:57:35 localhost python3[38582]: ansible-ipaclient_set_hostname Invoked with hostname=np0005532600.ooo.test Nov 23 02:57:35 localhost systemd[1]: Starting Hostname Service... Nov 23 02:57:35 localhost systemd[1]: Started Hostname Service. Nov 23 02:57:36 localhost python3[38601]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005532600.ooo.test kdc=ipa.ooo.test on_master=False Nov 23 02:57:37 localhost python3[38622]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005532600.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmpta6bm2mr principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Nov 23 02:57:37 localhost python3[38622]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Nov 23 02:57:39 localhost python3[38643]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005532600.ooo.test basedn=dc=ooo,dc=test Nov 23 02:57:39 localhost python3[38660]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005532600.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Nov 23 02:57:39 localhost systemd-journald[618]: Field hash table of /run/log/journal/6e0090cd4cf296f54418e234b90f721c/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Nov 23 02:57:39 localhost systemd-journald[618]: /run/log/journal/6e0090cd4cf296f54418e234b90f721c/system.journal: Journal header limits reached or header out-of-date, rotating. Nov 23 02:57:39 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Nov 23 02:57:39 localhost rsyslogd[759]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Nov 23 02:57:40 localhost python3[38678]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005532600.ooo.test krb_name=/tmp/tmpta6bm2mr debug=False Nov 23 02:57:42 localhost python3[38707]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005532600.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmpta6bm2mr ip_addresses=None Nov 23 02:57:46 localhost systemd[1]: Starting System Security Services Daemon... Nov 23 02:57:46 localhost sssd[38742]: Starting up Nov 23 02:57:46 localhost sssd_be[38743]: Starting up Nov 23 02:57:46 localhost sssd_ssh[38746]: Starting up Nov 23 02:57:46 localhost sssd_nss[38744]: Starting up Nov 23 02:57:46 localhost sssd_sudo[38747]: Starting up Nov 23 02:57:46 localhost sssd_pam[38745]: Starting up Nov 23 02:57:46 localhost sssd_pac[38748]: Starting up Nov 23 02:57:46 localhost systemd[1]: Started System Security Services Daemon. Nov 23 02:57:46 localhost systemd[1]: Reloading. Nov 23 02:57:46 localhost systemd-sysv-generator[38778]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:57:46 localhost systemd-rc-local-generator[38774]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:57:46 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:57:47 localhost python3[38803]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Nov 23 02:57:47 localhost systemd[1]: Stopping OpenSSH server daemon... Nov 23 02:57:47 localhost systemd[1]: sshd.service: Deactivated successfully. Nov 23 02:57:47 localhost systemd[1]: Stopped OpenSSH server daemon. Nov 23 02:57:47 localhost systemd[1]: Stopped target sshd-keygen.target. Nov 23 02:57:47 localhost systemd[1]: Stopping sshd-keygen.target... Nov 23 02:57:47 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:57:47 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:57:47 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Nov 23 02:57:47 localhost systemd[1]: Reached target sshd-keygen.target. Nov 23 02:57:47 localhost systemd[1]: Starting OpenSSH server daemon... Nov 23 02:57:47 localhost sshd[38808]: main: sshd: ssh-rsa algorithm is disabled Nov 23 02:57:47 localhost systemd[1]: Started OpenSSH server daemon. Nov 23 02:57:48 localhost python3[38825]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Nov 23 02:57:49 localhost python3[38842]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Nov 23 02:57:49 localhost systemd[1]: Reloading. Nov 23 02:57:49 localhost systemd-sysv-generator[38871]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:57:49 localhost systemd-rc-local-generator[38868]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:57:49 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:57:49 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Nov 23 02:57:49 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Nov 23 02:57:49 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Nov 23 02:57:49 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Nov 23 02:57:49 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Nov 23 02:57:50 localhost python3[38901]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpta6bm2mr state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:57:50 localhost python3[38917]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005532600.ooo.test sssd=True force=True Nov 23 02:57:51 localhost python3[38938]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005532600.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Nov 23 02:57:52 localhost python3[38957]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:57:52 localhost python3[38973]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpta6bm2mr state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:57:52 localhost python3[38989]: ansible-ansible.builtin.file Invoked with path=/tmp/tmpta6bm2mr.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:57:53 localhost python3[39005]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 02:57:53 localhost systemd[1]: Reloading. Nov 23 02:57:53 localhost systemd-rc-local-generator[39031]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:57:53 localhost systemd-sysv-generator[39034]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:57:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:57:53 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Nov 23 02:57:53 localhost certmonger[39044]: 2025-11-23 07:57:53 [39044] Changing to root directory. Nov 23 02:57:53 localhost certmonger[39044]: 2025-11-23 07:57:53 [39044] Obtaining system lock. Nov 23 02:57:53 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Nov 23 02:57:53 localhost certmonger[39045]: 2025-11-23 07:57:53 [39045] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:57:53 localhost certmonger[39046]: 2025-11-23 07:57:53 [39046] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:57:53 localhost certmonger[39047]: 2025-11-23 07:57:53 [39047] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:57:53 localhost certmonger[39048]: 2025-11-23 07:57:53 [39048] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:57:53 localhost certmonger[39049]: 2025-11-23 07:57:53 [39049] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:57:53 localhost certmonger[39050]: 2025-11-23 07:57:53 [39050] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:57:53 localhost certmonger[39051]: 2025-11-23 07:57:53 [39051] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:57:53 localhost certmonger[39052]: 2025-11-23 07:57:53 [39052] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:57:53 localhost certmonger[39053]: 2025-11-23 07:57:53 [39053] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Nov 23 02:57:53 localhost certmonger[39054]: 2025-11-23 07:57:53 [39054] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Nov 23 02:57:53 localhost certmonger[39055]: 2025-11-23 07:57:53 [39055] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Nov 23 02:57:53 localhost certmonger[39056]: 2025-11-23 07:57:53 [39056] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Nov 23 02:57:53 localhost certmonger[39057]: 2025-11-23 07:57:53 [39057] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Nov 23 02:57:53 localhost certmonger[39058]: 2025-11-23 07:57:53 [39058] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Nov 23 02:57:53 localhost certmonger[39059]: 2025-11-23 07:57:53 [39059] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Nov 23 02:57:53 localhost certmonger[39060]: 2025-11-23 07:57:53 [39060] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Nov 23 02:57:53 localhost certmonger[39061]: 2025-11-23 07:57:53 [39061] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Nov 23 02:57:53 localhost certmonger[39062]: 2025-11-23 07:57:53 [39062] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Nov 23 02:57:53 localhost certmonger[39063]: 2025-11-23 07:57:53 [39063] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Nov 23 02:57:53 localhost certmonger[39064]: 2025-11-23 07:57:53 [39064] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Nov 23 02:57:53 localhost certmonger[39065]: 2025-11-23 07:57:53 [39065] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Nov 23 02:57:53 localhost certmonger[39066]: 2025-11-23 07:57:53 [39066] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Nov 23 02:57:53 localhost certmonger[39067]: 2025-11-23 07:57:53 [39067] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Nov 23 02:57:53 localhost certmonger[39068]: 2025-11-23 07:57:53 [39068] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Nov 23 02:57:53 localhost certmonger[39044]: 2025-11-23 07:57:53 [39044] No hooks set for ca-pre-save command. Nov 23 02:57:53 localhost certmonger[39044]: 2025-11-23 07:57:53 [39044] No hooks set for ca-post-save command. Nov 23 02:57:53 localhost certmonger[39071]: 2025-11-23 07:57:53 [39071] Certificate "Local Signing Authority" valid for 31535999s. Nov 23 02:57:53 localhost certmonger[39044]: 2025-11-23 07:57:53 [39044] No hooks set for ca-pre-save command. Nov 23 02:57:53 localhost certmonger[39044]: 2025-11-23 07:57:53 [39044] No hooks set for ca-post-save command. Nov 23 02:57:53 localhost certmonger[39074]: 2025-11-23 07:57:53 [39074] Certificate "OOO.TEST IPA CA" valid for 631150999s. Nov 23 02:58:04 localhost python3[39122]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Nov 23 02:58:04 localhost python3[39165]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1763884684.0987794-104342-272557952132251/source _original_basename=tmpjgfmthab follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:58:05 localhost python3[39195]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Nov 23 02:58:05 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 23 02:58:07 localhost python3[39322]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Nov 23 02:58:09 localhost python3[39443]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Nov 23 02:58:10 localhost python3[39459]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Nov 23 02:58:10 localhost python3[39475]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Nov 23 02:58:11 localhost python3[39491]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 23 02:58:12 localhost python3[39511]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:58:15 localhost python3[39528]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 02:58:19 localhost python3[39546]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:58:19 localhost python3[39562]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 02:58:20 localhost python3[39578]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 02:58:20 localhost systemd[1]: Reloading. Nov 23 02:58:20 localhost systemd-rc-local-generator[39605]: /etc/rc.d/rc.local is not marked executable, skipping. Nov 23 02:58:20 localhost systemd-sysv-generator[39611]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Nov 23 02:58:20 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 23 02:58:21 localhost python3[39632]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005532600.ctlplane.ooo.test'] principal=['HTTP/np0005532600.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005532600.ctlplane.ooo.test" for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005532600.ctlplane.ooo.test Nov 23 02:58:21 localhost certmonger[39642]: " for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005532600.ctlplane.ooo.test@OOO.TEST Nov 23 02:58:21 localhost certmonger[39642]: " for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Nov 23 02:58:21 localhost certmonger[39642]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTMyNjAwLmN0bHBsYW5lLm9v Nov 23 02:58:21 localhost certmonger[39642]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzwqlX2vtq99a Nov 23 02:58:21 localhost certmonger[39642]: kGrdKWXhyTI670Ab7L0z0zDapcGKVNNsT/ONPzduftwXRSGbVS18tWXjLD2n6AbV Nov 23 02:58:21 localhost certmonger[39642]: 0dRVU4M+dXS3RKiN3D/PoNFdYVjbtNmmRVYvJ434qTpvKTMTqyqH5FjVnJ7tt5Wr Nov 23 02:58:21 localhost certmonger[39642]: zd8Ayv2L7W4JyoNjOnqHwahVVtnJo+bn7LUvJWW8E5juih3GbHord9whaxyPj8HK Nov 23 02:58:21 localhost certmonger[39642]: sd3JMyY6COH8zxHf6pkP0zzB2zVOw9kTKxYtd3l/LpQhMDy+bvQWwXxSYZdetgVz Nov 23 02:58:21 localhost certmonger[39642]: mLuw/etZWvBsdm/psOMhaUYOaVCE+4npe8K3CUbp9VnbFXXzE6vwX42j/rncQBbr Nov 23 02:58:21 localhost certmonger[39642]: vlxKti9iNwIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAxADIA Nov 23 02:58:21 localhost certmonger[39642]: MwAwADcANQA4ADIAMTCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Nov 23 02:58:21 localhost certmonger[39642]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1MzI2MDAuY3RscGxhbmUub29vLnRlc3Sg Nov 23 02:58:21 localhost certmonger[39642]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTUzMjYwMC5jdGxwbGFuZS5vb28u Nov 23 02:58:21 localhost certmonger[39642]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Nov 23 02:58:21 localhost certmonger[39642]: oSgwJhsESFRUUBsebnAwMDA1NTMyNjAwLmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Nov 23 02:58:21 localhost certmonger[39642]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Nov 23 02:58:21 localhost certmonger[39642]: BBRimeqNl8lzkh9HHKgw2ys/KQ+Q5zANBgkqhkiG9w0BAQsFAAOCAQEARuUaCyBu Nov 23 02:58:21 localhost certmonger[39642]: ddGctXLTC3zkuapXbYudjx0Ia352bbLD8+wrmX/4wkQtkPcrh96RA/PX0nI6gm8J Nov 23 02:58:21 localhost certmonger[39642]: 8xbTwLzq1E+6Ir3Y9uBADfaYs4BMCP/2GbYOEEtbq+0iq3oalE+E3XjY4Fn2LJng Nov 23 02:58:21 localhost certmonger[39642]: hkP4FyzSbTPq9y896yLNibQl4HVxhUrZX/jIdaZ11ZsZC1hB7s+uL4Khh2hlqVI/ Nov 23 02:58:21 localhost certmonger[39642]: h2pURKMnZcDvXva7xu4KjP7zAKuSKoZQdhGuZUhkNlqy+D1ZN6LA/zzCUmzZ6sz4 Nov 23 02:58:21 localhost certmonger[39642]: HS2HaKJCj3ktZhyTxRg0v9uBDMzdnlJNcafxw8VOZKbK/L0bcKk3w2UK7KZkDrDR Nov 23 02:58:21 localhost certmonger[39642]: /ylq/nOohjovgg== Nov 23 02:58:21 localhost certmonger[39642]: -----END CERTIFICATE REQUEST----- Nov 23 02:58:21 localhost certmonger[39642]: " for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_SPKAC" to "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" for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzwqlX2vtq99akGrdKWXhyTI670Ab7L0z0zDapcGKVNNsT/ONPzduftwXRSGbVS18tWXjLD2n6AbV0dRVU4M+dXS3RKiN3D/PoNFdYVjbtNmmRVYvJ434qTpvKTMTqyqH5FjVnJ7tt5Wrzd8Ayv2L7W4JyoNjOnqHwahVVtnJo+bn7LUvJWW8E5juih3GbHord9whaxyPj8HKsd3JMyY6COH8zxHf6pkP0zzB2zVOw9kTKxYtd3l/LpQhMDy+bvQWwXxSYZdetgVzmLuw/etZWvBsdm/psOMhaUYOaVCE+4npe8K3CUbp9VnbFXXzE6vwX42j/rncQBbrvlxKti9iNwIDAQAB" for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:21 localhost certmonger[39642]: 2025-11-23 07:58:21 [39642] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:21 localhost certmonger[39044]: 2025-11-23 07:58:21 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39642]: Submitting request to "https://ipa.ooo.test/ipa/json". Nov 23 02:58:22 localhost certmonger[39642]: Certificate: "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" Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Certificate submission still ongoing. Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Certificate submission attempt complete. Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Child status = 0. Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Child output: Nov 23 02:58:22 localhost certmonger[39044]: "-----BEGIN CERTIFICATE----- Nov 23 02:58:22 localhost certmonger[39044]: MIIFSTCCA7GgAwIBAgIBDjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:22 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:22 localhost certmonger[39044]: NTgyMloXDTI3MTEyNDA3NTgyMlowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Nov 23 02:58:22 localhost certmonger[39044]: BAMMHm5wMDAwNTUzMjYwMC5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Nov 23 02:58:22 localhost certmonger[39044]: AQEBBQADggEPADCCAQoCggEBAM8KpV9r7avfWpBq3Sll4ckyOu9AG+y9M9Mw2qXB Nov 23 02:58:22 localhost certmonger[39044]: ilTTbE/zjT83bn7cF0Uhm1UtfLVl4yw9p+gG1dHUVVODPnV0t0Sojdw/z6DRXWFY Nov 23 02:58:22 localhost certmonger[39044]: 27TZpkVWLyeN+Kk6bykzE6sqh+RY1Zye7beVq83fAMr9i+1uCcqDYzp6h8GoVVbZ Nov 23 02:58:22 localhost certmonger[39044]: yaPm5+y1LyVlvBOY7oodxmx6K3fcIWscj4/ByrHdyTMmOgjh/M8R3+qZD9M8wds1 Nov 23 02:58:22 localhost certmonger[39044]: TsPZEysWLXd5fy6UITA8vm70FsF8UmGXXrYFc5i7sP3rWVrwbHZv6bDjIWlGDmlQ Nov 23 02:58:22 localhost certmonger[39044]: hPuJ6XvCtwlG6fVZ2xV18xOr8F+No/653EAW675cSrYvYjcCAwEAAaOCAd0wggHZ Nov 23 02:58:22 localhost certmonger[39044]: MB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEBBC4w Nov 23 02:58:22 localhost certmonger[39044]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Nov 23 02:58:22 localhost certmonger[39044]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Nov 23 02:58:22 localhost certmonger[39044]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Nov 23 02:58:22 localhost certmonger[39044]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Nov 23 02:58:22 localhost certmonger[39044]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFECUBziK4pcuV6ppLsPWOBQjy35x Nov 23 02:58:22 localhost certmonger[39044]: MIG2BgNVHREEga4wgauCHm5wMDAwNTUzMjYwMC5jdGxwbGFuZS5vb28udGVzdKA8 Nov 23 02:58:22 localhost certmonger[39044]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTMyNjAwLmN0bHBsYW5lLm9vby50 Nov 23 02:58:22 localhost certmonger[39044]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Nov 23 02:58:22 localhost certmonger[39044]: KDAmGwRIVFRQGx5ucDAwMDU1MzI2MDAuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Nov 23 02:58:22 localhost certmonger[39044]: hvcNAQELBQADggGBAEV8fsFF45XvQp4BCojbKSyj1NbCehzKJdR2feSo4qdruBbH Nov 23 02:58:22 localhost certmonger[39044]: 6MdWdFU2EjcpePPyOB1WI9IEscuoHaEqJyA2jwnlG3koq1700wOdGEKbmgpRjPzd Nov 23 02:58:22 localhost certmonger[39044]: DLP5Xy5GB0wVsOWsef3G0BtR8N2SXzs0elm8K37g9y+cjBWl0kBDlGPUSvmOVgJf Nov 23 02:58:22 localhost certmonger[39044]: uw7ryAy/TNodxI3851KrWCVSJJDrqz8PaYL9xFCwupRGyc3YqcXvXvLIlnuojRr4 Nov 23 02:58:22 localhost certmonger[39044]: hywU04wx8LoKtEXH7nN1VAzQ7BG6FfWTlxNojwvdBr6QR699NX9ZZ9g+VW1CqdfR Nov 23 02:58:22 localhost certmonger[39044]: KOdO7uloDha+YLhoE1+FuPgTSzNWfr25gVOwU+Gq+tMIUz8tm7g6gYf8ATGznw6O Nov 23 02:58:22 localhost certmonger[39044]: A3cn+R8qelNpSBmol+dZDJNx1VTWI/4diPIU/69ygkRoOuxj7kS0HOUXzAoAUAb6 Nov 23 02:58:22 localhost certmonger[39044]: bbLoro1nobXnYv/2eTZFNvKhckXL4061sZ+Xtkm/kiih5UIRWTqUEKP562veCUGe Nov 23 02:58:22 localhost certmonger[39044]: vr/nDCXZo6Bz4L0rIw== Nov 23 02:58:22 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:22 localhost certmonger[39044]: " Nov 23 02:58:22 localhost certmonger[39644]: 2025-11-23 07:58:22 [39644] Postprocessing output "-----BEGIN CERTIFICATE----- Nov 23 02:58:22 localhost certmonger[39644]: MIIFSTCCA7GgAwIBAgIBDjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:22 localhost certmonger[39644]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:22 localhost certmonger[39644]: NTgyMloXDTI3MTEyNDA3NTgyMlowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Nov 23 02:58:22 localhost certmonger[39644]: BAMMHm5wMDAwNTUzMjYwMC5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Nov 23 02:58:22 localhost certmonger[39644]: AQEBBQADggEPADCCAQoCggEBAM8KpV9r7avfWpBq3Sll4ckyOu9AG+y9M9Mw2qXB Nov 23 02:58:22 localhost certmonger[39644]: ilTTbE/zjT83bn7cF0Uhm1UtfLVl4yw9p+gG1dHUVVODPnV0t0Sojdw/z6DRXWFY Nov 23 02:58:22 localhost certmonger[39644]: 27TZpkVWLyeN+Kk6bykzE6sqh+RY1Zye7beVq83fAMr9i+1uCcqDYzp6h8GoVVbZ Nov 23 02:58:22 localhost certmonger[39644]: yaPm5+y1LyVlvBOY7oodxmx6K3fcIWscj4/ByrHdyTMmOgjh/M8R3+qZD9M8wds1 Nov 23 02:58:22 localhost certmonger[39644]: TsPZEysWLXd5fy6UITA8vm70FsF8UmGXXrYFc5i7sP3rWVrwbHZv6bDjIWlGDmlQ Nov 23 02:58:22 localhost certmonger[39644]: hPuJ6XvCtwlG6fVZ2xV18xOr8F+No/653EAW675cSrYvYjcCAwEAAaOCAd0wggHZ Nov 23 02:58:22 localhost certmonger[39644]: MB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEBBC4w Nov 23 02:58:22 localhost certmonger[39644]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Nov 23 02:58:22 localhost certmonger[39644]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Nov 23 02:58:22 localhost certmonger[39644]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Nov 23 02:58:22 localhost certmonger[39644]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Nov 23 02:58:22 localhost certmonger[39644]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFECUBziK4pcuV6ppLsPWOBQjy35x Nov 23 02:58:22 localhost certmonger[39644]: MIG2BgNVHREEga4wgauCHm5wMDAwNTUzMjYwMC5jdGxwbGFuZS5vb28udGVzdKA8 Nov 23 02:58:22 localhost certmonger[39644]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTMyNjAwLmN0bHBsYW5lLm9vby50 Nov 23 02:58:22 localhost certmonger[39644]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Nov 23 02:58:22 localhost certmonger[39644]: KDAmGwRIVFRQGx5ucDAwMDU1MzI2MDAuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Nov 23 02:58:22 localhost certmonger[39644]: hvcNAQELBQADggGBAEV8fsFF45XvQp4BCojbKSyj1NbCehzKJdR2feSo4qdruBbH Nov 23 02:58:22 localhost certmonger[39644]: 6MdWdFU2EjcpePPyOB1WI9IEscuoHaEqJyA2jwnlG3koq1700wOdGEKbmgpRjPzd Nov 23 02:58:22 localhost certmonger[39644]: DLP5Xy5GB0wVsOWsef3G0BtR8N2SXzs0elm8K37g9y+cjBWl0kBDlGPUSvmOVgJf Nov 23 02:58:22 localhost certmonger[39644]: uw7ryAy/TNodxI3851KrWCVSJJDrqz8PaYL9xFCwupRGyc3YqcXvXvLIlnuojRr4 Nov 23 02:58:22 localhost certmonger[39644]: hywU04wx8LoKtEXH7nN1VAzQ7BG6FfWTlxNojwvdBr6QR699NX9ZZ9g+VW1CqdfR Nov 23 02:58:22 localhost certmonger[39644]: KOdO7uloDha+YLhoE1+FuPgTSzNWfr25gVOwU+Gq+tMIUz8tm7g6gYf8ATGznw6O Nov 23 02:58:22 localhost certmonger[39644]: A3cn+R8qelNpSBmol+dZDJNx1VTWI/4diPIU/69ygkRoOuxj7kS0HOUXzAoAUAb6 Nov 23 02:58:22 localhost certmonger[39644]: bbLoro1nobXnYv/2eTZFNvKhckXL4061sZ+Xtkm/kiih5UIRWTqUEKP562veCUGe Nov 23 02:58:22 localhost certmonger[39644]: vr/nDCXZo6Bz4L0rIw== Nov 23 02:58:22 localhost certmonger[39644]: -----END CERTIFICATE----- Nov 23 02:58:22 localhost certmonger[39644]: ". Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Certificate submission still ongoing. Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Certificate submission postprocessing complete. Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Child status = 0. Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Child output: Nov 23 02:58:22 localhost certmonger[39044]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nvr/nDCXZo6Bz4L0rIw==\n-----END CERTIFICATE-----\n","key_checked":true} Nov 23 02:58:22 localhost certmonger[39044]: " Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Issued certificate is "-----BEGIN CERTIFICATE----- Nov 23 02:58:22 localhost certmonger[39044]: MIIFSTCCA7GgAwIBAgIBDjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:22 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:22 localhost certmonger[39044]: NTgyMloXDTI3MTEyNDA3NTgyMlowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Nov 23 02:58:22 localhost certmonger[39044]: BAMMHm5wMDAwNTUzMjYwMC5jdGxwbGFuZS5vb28udGVzdDCCASIwDQYJKoZIhvcN Nov 23 02:58:22 localhost certmonger[39044]: AQEBBQADggEPADCCAQoCggEBAM8KpV9r7avfWpBq3Sll4ckyOu9AG+y9M9Mw2qXB Nov 23 02:58:22 localhost certmonger[39044]: ilTTbE/zjT83bn7cF0Uhm1UtfLVl4yw9p+gG1dHUVVODPnV0t0Sojdw/z6DRXWFY Nov 23 02:58:22 localhost certmonger[39044]: 27TZpkVWLyeN+Kk6bykzE6sqh+RY1Zye7beVq83fAMr9i+1uCcqDYzp6h8GoVVbZ Nov 23 02:58:22 localhost certmonger[39044]: yaPm5+y1LyVlvBOY7oodxmx6K3fcIWscj4/ByrHdyTMmOgjh/M8R3+qZD9M8wds1 Nov 23 02:58:22 localhost certmonger[39044]: TsPZEysWLXd5fy6UITA8vm70FsF8UmGXXrYFc5i7sP3rWVrwbHZv6bDjIWlGDmlQ Nov 23 02:58:22 localhost certmonger[39044]: hPuJ6XvCtwlG6fVZ2xV18xOr8F+No/653EAW675cSrYvYjcCAwEAAaOCAd0wggHZ Nov 23 02:58:22 localhost certmonger[39044]: MB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEBBC4w Nov 23 02:58:22 localhost certmonger[39044]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Nov 23 02:58:22 localhost certmonger[39044]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Nov 23 02:58:22 localhost certmonger[39044]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Nov 23 02:58:22 localhost certmonger[39044]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Nov 23 02:58:22 localhost certmonger[39044]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFECUBziK4pcuV6ppLsPWOBQjy35x Nov 23 02:58:22 localhost certmonger[39044]: MIG2BgNVHREEga4wgauCHm5wMDAwNTUzMjYwMC5jdGxwbGFuZS5vb28udGVzdKA8 Nov 23 02:58:22 localhost certmonger[39044]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTMyNjAwLmN0bHBsYW5lLm9vby50 Nov 23 02:58:22 localhost certmonger[39044]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Nov 23 02:58:22 localhost certmonger[39044]: KDAmGwRIVFRQGx5ucDAwMDU1MzI2MDAuY3RscGxhbmUub29vLnRlc3QwDQYJKoZI Nov 23 02:58:22 localhost certmonger[39044]: hvcNAQELBQADggGBAEV8fsFF45XvQp4BCojbKSyj1NbCehzKJdR2feSo4qdruBbH Nov 23 02:58:22 localhost certmonger[39044]: 6MdWdFU2EjcpePPyOB1WI9IEscuoHaEqJyA2jwnlG3koq1700wOdGEKbmgpRjPzd Nov 23 02:58:22 localhost certmonger[39044]: DLP5Xy5GB0wVsOWsef3G0BtR8N2SXzs0elm8K37g9y+cjBWl0kBDlGPUSvmOVgJf Nov 23 02:58:22 localhost certmonger[39044]: uw7ryAy/TNodxI3851KrWCVSJJDrqz8PaYL9xFCwupRGyc3YqcXvXvLIlnuojRr4 Nov 23 02:58:22 localhost certmonger[39044]: hywU04wx8LoKtEXH7nN1VAzQ7BG6FfWTlxNojwvdBr6QR699NX9ZZ9g+VW1CqdfR Nov 23 02:58:22 localhost certmonger[39044]: KOdO7uloDha+YLhoE1+FuPgTSzNWfr25gVOwU+Gq+tMIUz8tm7g6gYf8ATGznw6O Nov 23 02:58:22 localhost certmonger[39044]: A3cn+R8qelNpSBmol+dZDJNx1VTWI/4diPIU/69ygkRoOuxj7kS0HOUXzAoAUAb6 Nov 23 02:58:22 localhost certmonger[39044]: bbLoro1nobXnYv/2eTZFNvKhckXL4061sZ+Xtkm/kiih5UIRWTqUEKP562veCUGe Nov 23 02:58:22 localhost certmonger[39044]: vr/nDCXZo6Bz4L0rIw== Nov 23 02:58:22 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:22 localhost certmonger[39044]: ". Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Certificate issued (0 chain certificates, 0 roots). Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] No hooks set for pre-save command. Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost certmonger[39652]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Nov 23 02:58:22 localhost certmonger[39044]: 2025-11-23 07:58:22 [39044] Wrote to /var/lib/certmonger/requests/20251123075821 Nov 23 02:58:22 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Nov 23 02:58:23 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Nov 23 02:58:23 localhost python3[39671]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005532600.storage.ooo.test'] principal=['HTTP/np0005532600.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Nov 23 02:58:23 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Nov 23 02:58:23 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005532600.storage.ooo.test" for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005532600.storage.ooo.test Nov 23 02:58:23 localhost certmonger[39689]: " for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005532600.storage.ooo.test@OOO.TEST Nov 23 02:58:23 localhost certmonger[39689]: " for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Nov 23 02:58:23 localhost certmonger[39689]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTMyNjAwLnN0b3JhZ2Uub29v Nov 23 02:58:23 localhost certmonger[39689]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1TnNNF/ZWeaKy Nov 23 02:58:23 localhost certmonger[39689]: hYnn0fdfIpmueIiLyyY6ss7vUU0o9e1jHYDPRbCQhhV09aDIBUGiikwUNYi3wvN2 Nov 23 02:58:23 localhost certmonger[39689]: EM2mgFzTxXpP1jzZy4uXpfIRc3Wb2m61lEp5Yusf/RQm7ZZU/aS+Jhmiw12juJjC Nov 23 02:58:23 localhost certmonger[39689]: +8v5RQHKUzomE/4OZrNgxUblFwREzXMc4rqdm2fcL2xk7W1quv2HqrJW4wHy6sFh Nov 23 02:58:23 localhost certmonger[39689]: i9s8O9w4R5WSoEr+OVzNmo+IVKIlWZYIOU0ORyIBLol2SLKLRy6DhJpEtoOvkRQI Nov 23 02:58:23 localhost certmonger[39689]: dQkOSprDEBgaUFCUkemxTuKdO+UGFnu3PBvwnEcxBkRtsWcvzpl1L5ms+bcju2uR Nov 23 02:58:23 localhost certmonger[39689]: BY292uatAgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANQAxADEAMgAz Nov 23 02:58:23 localhost certmonger[39689]: ADAANwA1ADgAMgAzMIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Nov 23 02:58:23 localhost certmonger[39689]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTUzMjYwMC5zdG9yYWdlLm9vby50ZXN0oDsG Nov 23 02:58:23 localhost certmonger[39689]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1MzI2MDAuc3RvcmFnZS5vb28udGVz Nov 23 02:58:23 localhost certmonger[39689]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Nov 23 02:58:23 localhost certmonger[39689]: JRsESFRUUBsdbnAwMDA1NTMyNjAwLnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Nov 23 02:58:23 localhost certmonger[39689]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFGKZ Nov 23 02:58:23 localhost certmonger[39689]: 6o2XyXOSH0ccqDDbKz8pD5DnMA0GCSqGSIb3DQEBCwUAA4IBAQCar3KINcS+wE7X Nov 23 02:58:23 localhost certmonger[39689]: PygsS67sOcbq8kCSufnPyTkulEGuVuGJoNIb41fbM6Kcg65xkBN+Eu19HGP6kGe5 Nov 23 02:58:23 localhost certmonger[39689]: RvumhrKBcKLkcaENR4gQAn7ypM/737NtT2QjO6pqSmwHeFf0aD1q4Xq4PaFWsiSA Nov 23 02:58:23 localhost certmonger[39689]: F49a/OmC+706VymxZf43kvSDGop85X3SsrB7f3m5M6rhWAgjgVO52pCy8v7ZGDPa Nov 23 02:58:23 localhost certmonger[39689]: UDQ292KukkVWyp2gX/iuH2Wi+ee0TCOhGTe36OSvQPe4be+HdaFuPsQPXTuTr6gV Nov 23 02:58:23 localhost certmonger[39689]: CBl0SIKSFruGRZye7bP3XeuC6hnlgXD0Cv/uQ2EFNAO9PwEVjPFQVgrLGYrVEtz7 Nov 23 02:58:23 localhost certmonger[39689]: 0r48rxTd Nov 23 02:58:23 localhost certmonger[39689]: -----END CERTIFICATE REQUEST----- Nov 23 02:58:23 localhost certmonger[39689]: " for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC1TnNNF/ZWeaKyhYnn0fdfIpmueIiLyyY6ss7vUU0o9e1jHYDPRbCQhhV09aDIBUGiikwUNYi3wvN2EM2mgFzTxXpP1jzZy4uXpfIRc3Wb2m61lEp5Yusf/RQm7ZZU/aS+Jhmiw12juJjC+8v5RQHKUzomE/4OZrNgxUblFwREzXMc4rqdm2fcL2xk7W1quv2HqrJW4wHy6sFhi9s8O9w4R5WSoEr+OVzNmo+IVKIlWZYIOU0ORyIBLol2SLKLRy6DhJpEtoOvkRQIdQkOSprDEBgaUFCUkemxTuKdO+UGFnu3PBvwnEcxBkRtsWcvzpl1L5ms+bcju2uRBY292uatAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAeyhnoL6ZK1qMaCaR3jGZX9OKVgTWMJhW3VlAPvhhDj+jYpXfw1S8Gy/GHNMTZ8DwaGpPljzRrFOEwzRwKYGcBg3MzdVrTHJiy8ROib9r/MjkC+w+g051rTNh/KmBR9eqwOVeG1miq9lFWirNKmYh/qhN+tb/aqc+EKkCskl2lMpEzJsH/IDJ4drdXdejDc+asZkSW2sywCWCJjB3Cy3DIs+C+STSUnqFFJ7A/71Gg3ruYEwwxR7kcEjf4ZAp5vIPwzcngoPamVMd/vsVv2YyTFWj8Kiv+drv4qh1bG/y+PFAvlt/8uD8GmhXM+GygsGVWpZe/yXdpPlEHvNWXrYAKw==" for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtU5zTRf2VnmisoWJ59H3XyKZrniIi8smOrLO71FNKPXtYx2Az0WwkIYVdPWgyAVBoopMFDWIt8LzdhDNpoBc08V6T9Y82cuLl6XyEXN1m9putZRKeWLrH/0UJu2WVP2kviYZosNdo7iYwvvL+UUBylM6JhP+DmazYMVG5RcERM1zHOK6nZtn3C9sZO1tarr9h6qyVuMB8urBYYvbPDvcOEeVkqBK/jlczZqPiFSiJVmWCDlNDkciAS6Jdkiyi0cug4SaRLaDr5EUCHUJDkqawxAYGlBQlJHpsU7inTvlBhZ7tzwb8JxHMQZEbbFnL86ZdS+ZrPm3I7trkQWNvdrmrQIDAQAB" for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:23 localhost certmonger[39689]: 2025-11-23 07:58:23 [39689] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:23 localhost certmonger[39044]: 2025-11-23 07:58:23 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39689]: Submitting request to "https://ipa.ooo.test/ipa/json". Nov 23 02:58:24 localhost certmonger[39689]: Certificate: "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" Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Certificate submission still ongoing. Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Certificate submission attempt complete. Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Child status = 0. Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Child output: Nov 23 02:58:24 localhost certmonger[39044]: "-----BEGIN CERTIFICATE----- Nov 23 02:58:24 localhost certmonger[39044]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:24 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:24 localhost certmonger[39044]: NTgyNFoXDTI3MTEyNDA3NTgyNFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Nov 23 02:58:24 localhost certmonger[39044]: BAMMHW5wMDAwNTUzMjYwMC5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Nov 23 02:58:24 localhost certmonger[39044]: AQEFAAOCAQ8AMIIBCgKCAQEAtU5zTRf2VnmisoWJ59H3XyKZrniIi8smOrLO71FN Nov 23 02:58:24 localhost certmonger[39044]: KPXtYx2Az0WwkIYVdPWgyAVBoopMFDWIt8LzdhDNpoBc08V6T9Y82cuLl6XyEXN1 Nov 23 02:58:24 localhost certmonger[39044]: m9putZRKeWLrH/0UJu2WVP2kviYZosNdo7iYwvvL+UUBylM6JhP+DmazYMVG5RcE Nov 23 02:58:24 localhost certmonger[39044]: RM1zHOK6nZtn3C9sZO1tarr9h6qyVuMB8urBYYvbPDvcOEeVkqBK/jlczZqPiFSi Nov 23 02:58:24 localhost certmonger[39044]: JVmWCDlNDkciAS6Jdkiyi0cug4SaRLaDr5EUCHUJDkqawxAYGlBQlJHpsU7inTvl Nov 23 02:58:24 localhost certmonger[39044]: BhZ7tzwb8JxHMQZEbbFnL86ZdS+ZrPm3I7trkQWNvdrmrQIDAQABo4IB2jCCAdYw Nov 23 02:58:24 localhost certmonger[39044]: HwYDVR0jBBgwFoAUeWda7LqOWmKMxA6rGpoYSSfiVCEwOgYIKwYBBQUHAQEELjAs Nov 23 02:58:24 localhost certmonger[39044]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Nov 23 02:58:24 localhost certmonger[39044]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Nov 23 02:58:24 localhost certmonger[39044]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Nov 23 02:58:24 localhost certmonger[39044]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Nov 23 02:58:24 localhost certmonger[39044]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUkkiN+qWFAmlbgddPAs0phyU+6lAw Nov 23 02:58:24 localhost certmonger[39044]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTMyNjAwLnN0b3JhZ2Uub29vLnRlc3SgOwYK Nov 23 02:58:24 localhost certmonger[39044]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTUzMjYwMC5zdG9yYWdlLm9vby50ZXN0 Nov 23 02:58:24 localhost certmonger[39044]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Nov 23 02:58:24 localhost certmonger[39044]: GwRIVFRQGx1ucDAwMDU1MzI2MDAuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Nov 23 02:58:24 localhost certmonger[39044]: AQsFAAOCAYEAA8cOurGN4sr5U94J+EA+eq2JDFJBFj1JrBSoJGo9RfvFsa5zdfYj Nov 23 02:58:24 localhost certmonger[39044]: LyIXWNcUdgPGmozYIynLYHm3NETLKDzmTryNEaGvNswdS1SVT/I8WK1rlF6yD+6H Nov 23 02:58:24 localhost certmonger[39044]: EujmvowfIIgL5cIKXjcE0VdwXS+ZSJd/Ae7Pz3Xd40nvlV8oEBXT1ayfFEbkmGdb Nov 23 02:58:24 localhost certmonger[39044]: fadK1Iq5xbIUCVquyD953XoGRrva4qVJ4Rky3SshoFcAdyFrMZpHKnEnw1IVvCrr Nov 23 02:58:24 localhost certmonger[39044]: 04J8ED7sUmk64cTWpsaRhTPeJLJxhHTXbGW9fCdImfJWqlesDt91s9wu/fTSiDcY Nov 23 02:58:24 localhost certmonger[39044]: O7nABYHbdlMsRp7xV9REcS1FG7V+kChysimL3CIIC60RJbwd/V9GINYDyUUZ63on Nov 23 02:58:24 localhost certmonger[39044]: HdONzMlapxlKO6E8Ag4TxaFSE7AK3lFKzUQIfcbdTr0tdE2WqYeaFmfl+mNfxaWf Nov 23 02:58:24 localhost certmonger[39044]: gV1XrW3JqweULasObjuiFk+/v4fKhxab+9klfZMotn86X8p7E76QGN9uUN5ClTxS Nov 23 02:58:24 localhost certmonger[39044]: EdrpB6daX7vx Nov 23 02:58:24 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:24 localhost certmonger[39044]: " Nov 23 02:58:24 localhost certmonger[39691]: 2025-11-23 07:58:24 [39691] Postprocessing output "-----BEGIN CERTIFICATE----- Nov 23 02:58:24 localhost certmonger[39691]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:24 localhost certmonger[39691]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:24 localhost certmonger[39691]: NTgyNFoXDTI3MTEyNDA3NTgyNFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Nov 23 02:58:24 localhost certmonger[39691]: BAMMHW5wMDAwNTUzMjYwMC5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Nov 23 02:58:24 localhost certmonger[39691]: AQEFAAOCAQ8AMIIBCgKCAQEAtU5zTRf2VnmisoWJ59H3XyKZrniIi8smOrLO71FN Nov 23 02:58:24 localhost certmonger[39691]: KPXtYx2Az0WwkIYVdPWgyAVBoopMFDWIt8LzdhDNpoBc08V6T9Y82cuLl6XyEXN1 Nov 23 02:58:24 localhost certmonger[39691]: m9putZRKeWLrH/0UJu2WVP2kviYZosNdo7iYwvvL+UUBylM6JhP+DmazYMVG5RcE Nov 23 02:58:24 localhost certmonger[39691]: RM1zHOK6nZtn3C9sZO1tarr9h6qyVuMB8urBYYvbPDvcOEeVkqBK/jlczZqPiFSi Nov 23 02:58:24 localhost certmonger[39691]: JVmWCDlNDkciAS6Jdkiyi0cug4SaRLaDr5EUCHUJDkqawxAYGlBQlJHpsU7inTvl Nov 23 02:58:24 localhost certmonger[39691]: BhZ7tzwb8JxHMQZEbbFnL86ZdS+ZrPm3I7trkQWNvdrmrQIDAQABo4IB2jCCAdYw Nov 23 02:58:24 localhost certmonger[39691]: HwYDVR0jBBgwFoAUeWda7LqOWmKMxA6rGpoYSSfiVCEwOgYIKwYBBQUHAQEELjAs Nov 23 02:58:24 localhost certmonger[39691]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Nov 23 02:58:24 localhost certmonger[39691]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Nov 23 02:58:24 localhost certmonger[39691]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Nov 23 02:58:24 localhost certmonger[39691]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Nov 23 02:58:24 localhost certmonger[39691]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUkkiN+qWFAmlbgddPAs0phyU+6lAw Nov 23 02:58:24 localhost certmonger[39691]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTMyNjAwLnN0b3JhZ2Uub29vLnRlc3SgOwYK Nov 23 02:58:24 localhost certmonger[39691]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTUzMjYwMC5zdG9yYWdlLm9vby50ZXN0 Nov 23 02:58:24 localhost certmonger[39691]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Nov 23 02:58:24 localhost certmonger[39691]: GwRIVFRQGx1ucDAwMDU1MzI2MDAuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Nov 23 02:58:24 localhost certmonger[39691]: AQsFAAOCAYEAA8cOurGN4sr5U94J+EA+eq2JDFJBFj1JrBSoJGo9RfvFsa5zdfYj Nov 23 02:58:24 localhost certmonger[39691]: LyIXWNcUdgPGmozYIynLYHm3NETLKDzmTryNEaGvNswdS1SVT/I8WK1rlF6yD+6H Nov 23 02:58:24 localhost certmonger[39691]: EujmvowfIIgL5cIKXjcE0VdwXS+ZSJd/Ae7Pz3Xd40nvlV8oEBXT1ayfFEbkmGdb Nov 23 02:58:24 localhost certmonger[39691]: fadK1Iq5xbIUCVquyD953XoGRrva4qVJ4Rky3SshoFcAdyFrMZpHKnEnw1IVvCrr Nov 23 02:58:24 localhost certmonger[39691]: 04J8ED7sUmk64cTWpsaRhTPeJLJxhHTXbGW9fCdImfJWqlesDt91s9wu/fTSiDcY Nov 23 02:58:24 localhost certmonger[39691]: O7nABYHbdlMsRp7xV9REcS1FG7V+kChysimL3CIIC60RJbwd/V9GINYDyUUZ63on Nov 23 02:58:24 localhost certmonger[39691]: HdONzMlapxlKO6E8Ag4TxaFSE7AK3lFKzUQIfcbdTr0tdE2WqYeaFmfl+mNfxaWf Nov 23 02:58:24 localhost certmonger[39691]: gV1XrW3JqweULasObjuiFk+/v4fKhxab+9klfZMotn86X8p7E76QGN9uUN5ClTxS Nov 23 02:58:24 localhost certmonger[39691]: EdrpB6daX7vx Nov 23 02:58:24 localhost certmonger[39691]: -----END CERTIFICATE----- Nov 23 02:58:24 localhost certmonger[39691]: ". Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Certificate submission still ongoing. Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Certificate submission postprocessing complete. Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Child status = 0. Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Child output: Nov 23 02:58:24 localhost certmonger[39044]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nEdrpB6daX7vx\n-----END CERTIFICATE-----\n","key_checked":true} Nov 23 02:58:24 localhost certmonger[39044]: " Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Issued certificate is "-----BEGIN CERTIFICATE----- Nov 23 02:58:24 localhost certmonger[39044]: MIIFRTCCA62gAwIBAgIBETANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:24 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:24 localhost certmonger[39044]: NTgyNFoXDTI3MTEyNDA3NTgyNFowOzERMA8GA1UECgwIT09PLlRFU1QxJjAkBgNV Nov 23 02:58:24 localhost certmonger[39044]: BAMMHW5wMDAwNTUzMjYwMC5zdG9yYWdlLm9vby50ZXN0MIIBIjANBgkqhkiG9w0B Nov 23 02:58:24 localhost certmonger[39044]: AQEFAAOCAQ8AMIIBCgKCAQEAtU5zTRf2VnmisoWJ59H3XyKZrniIi8smOrLO71FN Nov 23 02:58:24 localhost certmonger[39044]: KPXtYx2Az0WwkIYVdPWgyAVBoopMFDWIt8LzdhDNpoBc08V6T9Y82cuLl6XyEXN1 Nov 23 02:58:24 localhost certmonger[39044]: m9putZRKeWLrH/0UJu2WVP2kviYZosNdo7iYwvvL+UUBylM6JhP+DmazYMVG5RcE Nov 23 02:58:24 localhost certmonger[39044]: RM1zHOK6nZtn3C9sZO1tarr9h6qyVuMB8urBYYvbPDvcOEeVkqBK/jlczZqPiFSi Nov 23 02:58:24 localhost certmonger[39044]: JVmWCDlNDkciAS6Jdkiyi0cug4SaRLaDr5EUCHUJDkqawxAYGlBQlJHpsU7inTvl Nov 23 02:58:24 localhost certmonger[39044]: BhZ7tzwb8JxHMQZEbbFnL86ZdS+ZrPm3I7trkQWNvdrmrQIDAQABo4IB2jCCAdYw Nov 23 02:58:24 localhost certmonger[39044]: HwYDVR0jBBgwFoAUeWda7LqOWmKMxA6rGpoYSSfiVCEwOgYIKwYBBQUHAQEELjAs Nov 23 02:58:24 localhost certmonger[39044]: MCoGCCsGAQUFBzABhh5odHRwOi8vaXBhLWNhLm9vby50ZXN0L2NhL29jc3AwDgYD Nov 23 02:58:24 localhost certmonger[39044]: VR0PAQH/BAQDAgTwMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjBzBgNV Nov 23 02:58:24 localhost certmonger[39044]: HR8EbDBqMGigMKAuhixodHRwOi8vaXBhLWNhLm9vby50ZXN0L2lwYS9jcmwvTWFz Nov 23 02:58:24 localhost certmonger[39044]: dGVyQ1JMLmJpbqI0pDIwMDEOMAwGA1UECgwFaXBhY2ExHjAcBgNVBAMMFUNlcnRp Nov 23 02:58:24 localhost certmonger[39044]: ZmljYXRlIEF1dGhvcml0eTAdBgNVHQ4EFgQUkkiN+qWFAmlbgddPAs0phyU+6lAw Nov 23 02:58:24 localhost certmonger[39044]: gbMGA1UdEQSBqzCBqIIdbnAwMDA1NTMyNjAwLnN0b3JhZ2Uub29vLnRlc3SgOwYK Nov 23 02:58:24 localhost certmonger[39044]: KwYBBAGCNxQCA6AtDCtIVFRQL25wMDAwNTUzMjYwMC5zdG9yYWdlLm9vby50ZXN0 Nov 23 02:58:24 localhost certmonger[39044]: QE9PTy5URVNUoEoGBisGAQUCAqBAMD6gChsIT09PLlRFU1ShMDAuoAMCAQGhJzAl Nov 23 02:58:24 localhost certmonger[39044]: GwRIVFRQGx1ucDAwMDU1MzI2MDAuc3RvcmFnZS5vb28udGVzdDANBgkqhkiG9w0B Nov 23 02:58:24 localhost certmonger[39044]: AQsFAAOCAYEAA8cOurGN4sr5U94J+EA+eq2JDFJBFj1JrBSoJGo9RfvFsa5zdfYj Nov 23 02:58:24 localhost certmonger[39044]: LyIXWNcUdgPGmozYIynLYHm3NETLKDzmTryNEaGvNswdS1SVT/I8WK1rlF6yD+6H Nov 23 02:58:24 localhost certmonger[39044]: EujmvowfIIgL5cIKXjcE0VdwXS+ZSJd/Ae7Pz3Xd40nvlV8oEBXT1ayfFEbkmGdb Nov 23 02:58:24 localhost certmonger[39044]: fadK1Iq5xbIUCVquyD953XoGRrva4qVJ4Rky3SshoFcAdyFrMZpHKnEnw1IVvCrr Nov 23 02:58:24 localhost certmonger[39044]: 04J8ED7sUmk64cTWpsaRhTPeJLJxhHTXbGW9fCdImfJWqlesDt91s9wu/fTSiDcY Nov 23 02:58:24 localhost certmonger[39044]: O7nABYHbdlMsRp7xV9REcS1FG7V+kChysimL3CIIC60RJbwd/V9GINYDyUUZ63on Nov 23 02:58:24 localhost certmonger[39044]: HdONzMlapxlKO6E8Ag4TxaFSE7AK3lFKzUQIfcbdTr0tdE2WqYeaFmfl+mNfxaWf Nov 23 02:58:24 localhost certmonger[39044]: gV1XrW3JqweULasObjuiFk+/v4fKhxab+9klfZMotn86X8p7E76QGN9uUN5ClTxS Nov 23 02:58:24 localhost certmonger[39044]: EdrpB6daX7vx Nov 23 02:58:24 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:24 localhost certmonger[39044]: ". Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Certificate issued (0 chain certificates, 0 roots). Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] No hooks set for pre-save command. Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost certmonger[39699]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Nov 23 02:58:24 localhost certmonger[39044]: 2025-11-23 07:58:24 [39044] Wrote to /var/lib/certmonger/requests/20251123075823 Nov 23 02:58:24 localhost auditd[726]: queue to plugins is full - dropping event Nov 23 02:58:24 localhost auditd[726]: queue to plugins is full - dropping event Nov 23 02:58:24 localhost auditd[726]: queue to plugins is full - dropping event Nov 23 02:58:24 localhost auditd[726]: queue to plugins is full - dropping event Nov 23 02:58:24 localhost auditd[726]: queue to plugins is full - dropping event Nov 23 02:58:24 localhost auditd[726]: auditd queue full reporting limit reached - ending dropped event notifications Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:24 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost python3[39716]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005532600.storagemgmt.ooo.test'] principal=['HTTP/np0005532600.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:25 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005532600.storagemgmt.ooo.test" for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005532600.storagemgmt.ooo.test Nov 23 02:58:26 localhost certmonger[39726]: " for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005532600.storagemgmt.ooo.test@OOO.TEST Nov 23 02:58:26 localhost certmonger[39726]: " for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Nov 23 02:58:26 localhost certmonger[39726]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTMyNjAwLnN0b3JhZ2VtZ210 Nov 23 02:58:26 localhost certmonger[39726]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAri/sds/t Nov 23 02:58:26 localhost certmonger[39726]: 6GADoJHwNZWfrM4UBdotJUQo1YTfpdDTGTRQSnkHN2zQahSGkga251H5GGI3T2im Nov 23 02:58:26 localhost certmonger[39726]: tMPV+7S1qUFQ3Ar8bUcrZ3Ob+QTGBQtE5Scs3Ek0euDccwdSSm5vSnhVUH0E7Ev8 Nov 23 02:58:26 localhost certmonger[39726]: mxmcj+QwDMH9V3wyvuim77/J2PROZHF53cJFtonXoYsZGxZOYWDDB8e8Ipkb3OVi Nov 23 02:58:26 localhost certmonger[39726]: EjPBYJnbkfJc3DS3siBWllsHsDnubI+QHn9TKNEmv+zyLSrpPhXtxB+qtqzjAYZA Nov 23 02:58:26 localhost certmonger[39726]: Ji5sEMn3nXx13mH4hGgct3tyTHAaTHCljTWHKrQ11/523YpQe3F0iEr8Aqgj3NEq Nov 23 02:58:26 localhost certmonger[39726]: HcZXR7nwFwSc8wIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAx Nov 23 02:58:26 localhost certmonger[39726]: ADIAMwAwADcANQA4ADIANjCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Nov 23 02:58:26 localhost certmonger[39726]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1MzI2MDAuc3RvcmFnZW1nbXQub29v Nov 23 02:58:26 localhost certmonger[39726]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTUzMjYwMC5zdG9yYWdl Nov 23 02:58:26 localhost certmonger[39726]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Nov 23 02:58:26 localhost certmonger[39726]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTMyNjAwLnN0b3JhZ2VtZ210Lm9v Nov 23 02:58:26 localhost certmonger[39726]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Nov 23 02:58:26 localhost certmonger[39726]: AjAAMB0GA1UdDgQWBBRimeqNl8lzkh9HHKgw2ys/KQ+Q5zANBgkqhkiG9w0BAQsF Nov 23 02:58:26 localhost certmonger[39726]: AAOCAQEAIDBnhyhM3KReRXAE49PipiryT98SWg6tNe8bLTea/ozX/dHHGMsbeamn Nov 23 02:58:26 localhost certmonger[39726]: aIPFVh4E3Y12jxQr4g0DxGaf2Q/Cm9d1LtUZe6A488JKNoJcj3VHAAVjebUGMCVm Nov 23 02:58:26 localhost certmonger[39726]: lERPpy3irKBO5nZhSGuwCjJanMXDKT5MaqX6y3VbzyjsJL4b4RTo50Wki+VioTa2 Nov 23 02:58:26 localhost certmonger[39726]: OtzVtst1ZepyZBs4FWKdYTXLXCuXHqBVnJ8Y+UUrWCjf2ROPGj3kKmSlExN2/May Nov 23 02:58:26 localhost certmonger[39726]: Icqgkem7IdTqWKCbemmAZo0u8WZ2xDmX0ee5r/OsQdysEH+j+sD9Solsfl4oOm59 Nov 23 02:58:26 localhost certmonger[39726]: EWbiJV6hyigVvIJPnFHHTQT0dpxCWA== Nov 23 02:58:26 localhost certmonger[39726]: -----END CERTIFICATE REQUEST----- Nov 23 02:58:26 localhost certmonger[39726]: " for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_SPKAC" to "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" for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAri/sds/t6GADoJHwNZWfrM4UBdotJUQo1YTfpdDTGTRQSnkHN2zQahSGkga251H5GGI3T2imtMPV+7S1qUFQ3Ar8bUcrZ3Ob+QTGBQtE5Scs3Ek0euDccwdSSm5vSnhVUH0E7Ev8mxmcj+QwDMH9V3wyvuim77/J2PROZHF53cJFtonXoYsZGxZOYWDDB8e8Ipkb3OViEjPBYJnbkfJc3DS3siBWllsHsDnubI+QHn9TKNEmv+zyLSrpPhXtxB+qtqzjAYZAJi5sEMn3nXx13mH4hGgct3tyTHAaTHCljTWHKrQ11/523YpQe3F0iEr8Aqgj3NEqHcZXR7nwFwSc8wIDAQAB" for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:26 localhost certmonger[39726]: 2025-11-23 07:58:26 [39726] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:26 localhost certmonger[39044]: 2025-11-23 07:58:26 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost certmonger[39726]: Submitting request to "https://ipa.ooo.test/ipa/json". Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:26 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost certmonger[39726]: Certificate: "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" Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Certificate submission still ongoing. Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Certificate submission attempt complete. Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Child status = 0. Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Child output: Nov 23 02:58:27 localhost certmonger[39044]: "-----BEGIN CERTIFICATE----- Nov 23 02:58:27 localhost certmonger[39044]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:27 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:27 localhost certmonger[39044]: NTgyNloXDTI3MTEyNDA3NTgyNlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Nov 23 02:58:27 localhost certmonger[39044]: BAMMIW5wMDAwNTUzMjYwMC5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Nov 23 02:58:27 localhost certmonger[39044]: hvcNAQEBBQADggEPADCCAQoCggEBAK4v7HbP7ehgA6CR8DWVn6zOFAXaLSVEKNWE Nov 23 02:58:27 localhost certmonger[39044]: 36XQ0xk0UEp5Bzds0GoUhpIGtudR+RhiN09oprTD1fu0talBUNwK/G1HK2dzm/kE Nov 23 02:58:27 localhost certmonger[39044]: xgULROUnLNxJNHrg3HMHUkpub0p4VVB9BOxL/JsZnI/kMAzB/Vd8Mr7opu+/ydj0 Nov 23 02:58:27 localhost certmonger[39044]: TmRxed3CRbaJ16GLGRsWTmFgwwfHvCKZG9zlYhIzwWCZ25HyXNw0t7IgVpZbB7A5 Nov 23 02:58:27 localhost certmonger[39044]: 7myPkB5/UyjRJr/s8i0q6T4V7cQfqras4wGGQCYubBDJ9518dd5h+IRoHLd7ckxw Nov 23 02:58:27 localhost certmonger[39044]: GkxwpY01hyq0Ndf+dt2KUHtxdIhK/AKoI9zRKh3GV0e58BcEnPMCAwEAAaOCAeYw Nov 23 02:58:27 localhost certmonger[39044]: ggHiMB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEB Nov 23 02:58:27 localhost certmonger[39044]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Nov 23 02:58:27 localhost certmonger[39044]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Nov 23 02:58:27 localhost certmonger[39044]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Nov 23 02:58:27 localhost certmonger[39044]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Nov 23 02:58:27 localhost certmonger[39044]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNWwky5z2HbTYeBsV4Uch/Nr Nov 23 02:58:27 localhost certmonger[39044]: kEOYMIG/BgNVHREEgbcwgbSCIW5wMDAwNTUzMjYwMC5zdG9yYWdlbWdtdC5vb28u Nov 23 02:58:27 localhost certmonger[39044]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTMyNjAwLnN0b3JhZ2Vt Nov 23 02:58:27 localhost certmonger[39044]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Nov 23 02:58:27 localhost certmonger[39044]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1MzI2MDAuc3RvcmFnZW1nbXQub29v Nov 23 02:58:27 localhost certmonger[39044]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAE8+GqV3R2qI119VoHUFjeZ2D7mc07no Nov 23 02:58:27 localhost certmonger[39044]: JDL2AcRsFVZIileCKFTamABlcTpRMANlVOdyytVv+DUcKMwidp6nartyQqmfL9qn Nov 23 02:58:27 localhost certmonger[39044]: 7kRh7Y3RbPRFk5lJMDHBPBAeqU3/Tvj7y68MMNZZmhooD9qefkf+eMkvXkFbXunJ Nov 23 02:58:27 localhost certmonger[39044]: QQYlQ2jx9sIJwU0HUT3z0id1hcGuhMvy9UbG4CupC7uJTyfxfPUNkRkgM7PGi7Yo Nov 23 02:58:27 localhost certmonger[39044]: U4WlVwPoNXntZ7ffmTJ68NiM+3lS96AaaOmF926PGf63vyp4jHsaUFtgnny/K43W Nov 23 02:58:27 localhost certmonger[39044]: h3tpiOSkKonEDPU+Y7OgUzgTKGhx8V4Mam6JXlDsupOE6VxGxK67VEY6umRQnQlm Nov 23 02:58:27 localhost certmonger[39044]: xEAyVq7hQ164BpC2rmorTq5MzM/FtzfKurLFLKu18zVo/KcJGhOvBplCzyuaHXmH Nov 23 02:58:27 localhost certmonger[39044]: ayzdnDhQYPJMTQMazGRcMKOCCKxL39gqi3dXi4KSQRxuqlgivpYuvHI5PzlIzRtb Nov 23 02:58:27 localhost certmonger[39044]: lqeHBiHFg0xlzuhuwkKbsG1DBbyPKO5JKg== Nov 23 02:58:27 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:27 localhost certmonger[39044]: " Nov 23 02:58:27 localhost certmonger[39728]: 2025-11-23 07:58:27 [39728] Postprocessing output "-----BEGIN CERTIFICATE----- Nov 23 02:58:27 localhost certmonger[39728]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:27 localhost certmonger[39728]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:27 localhost certmonger[39728]: NTgyNloXDTI3MTEyNDA3NTgyNlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Nov 23 02:58:27 localhost certmonger[39728]: BAMMIW5wMDAwNTUzMjYwMC5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Nov 23 02:58:27 localhost certmonger[39728]: hvcNAQEBBQADggEPADCCAQoCggEBAK4v7HbP7ehgA6CR8DWVn6zOFAXaLSVEKNWE Nov 23 02:58:27 localhost certmonger[39728]: 36XQ0xk0UEp5Bzds0GoUhpIGtudR+RhiN09oprTD1fu0talBUNwK/G1HK2dzm/kE Nov 23 02:58:27 localhost certmonger[39728]: xgULROUnLNxJNHrg3HMHUkpub0p4VVB9BOxL/JsZnI/kMAzB/Vd8Mr7opu+/ydj0 Nov 23 02:58:27 localhost certmonger[39728]: TmRxed3CRbaJ16GLGRsWTmFgwwfHvCKZG9zlYhIzwWCZ25HyXNw0t7IgVpZbB7A5 Nov 23 02:58:27 localhost certmonger[39728]: 7myPkB5/UyjRJr/s8i0q6T4V7cQfqras4wGGQCYubBDJ9518dd5h+IRoHLd7ckxw Nov 23 02:58:27 localhost certmonger[39728]: GkxwpY01hyq0Ndf+dt2KUHtxdIhK/AKoI9zRKh3GV0e58BcEnPMCAwEAAaOCAeYw Nov 23 02:58:27 localhost certmonger[39728]: ggHiMB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEB Nov 23 02:58:27 localhost certmonger[39728]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Nov 23 02:58:27 localhost certmonger[39728]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Nov 23 02:58:27 localhost certmonger[39728]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Nov 23 02:58:27 localhost certmonger[39728]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Nov 23 02:58:27 localhost certmonger[39728]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNWwky5z2HbTYeBsV4Uch/Nr Nov 23 02:58:27 localhost certmonger[39728]: kEOYMIG/BgNVHREEgbcwgbSCIW5wMDAwNTUzMjYwMC5zdG9yYWdlbWdtdC5vb28u Nov 23 02:58:27 localhost certmonger[39728]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTMyNjAwLnN0b3JhZ2Vt Nov 23 02:58:27 localhost certmonger[39728]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Nov 23 02:58:27 localhost certmonger[39728]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1MzI2MDAuc3RvcmFnZW1nbXQub29v Nov 23 02:58:27 localhost certmonger[39728]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAE8+GqV3R2qI119VoHUFjeZ2D7mc07no Nov 23 02:58:27 localhost certmonger[39728]: JDL2AcRsFVZIileCKFTamABlcTpRMANlVOdyytVv+DUcKMwidp6nartyQqmfL9qn Nov 23 02:58:27 localhost certmonger[39728]: 7kRh7Y3RbPRFk5lJMDHBPBAeqU3/Tvj7y68MMNZZmhooD9qefkf+eMkvXkFbXunJ Nov 23 02:58:27 localhost certmonger[39728]: QQYlQ2jx9sIJwU0HUT3z0id1hcGuhMvy9UbG4CupC7uJTyfxfPUNkRkgM7PGi7Yo Nov 23 02:58:27 localhost certmonger[39728]: U4WlVwPoNXntZ7ffmTJ68NiM+3lS96AaaOmF926PGf63vyp4jHsaUFtgnny/K43W Nov 23 02:58:27 localhost certmonger[39728]: h3tpiOSkKonEDPU+Y7OgUzgTKGhx8V4Mam6JXlDsupOE6VxGxK67VEY6umRQnQlm Nov 23 02:58:27 localhost certmonger[39728]: xEAyVq7hQ164BpC2rmorTq5MzM/FtzfKurLFLKu18zVo/KcJGhOvBplCzyuaHXmH Nov 23 02:58:27 localhost certmonger[39728]: ayzdnDhQYPJMTQMazGRcMKOCCKxL39gqi3dXi4KSQRxuqlgivpYuvHI5PzlIzRtb Nov 23 02:58:27 localhost certmonger[39728]: lqeHBiHFg0xlzuhuwkKbsG1DBbyPKO5JKg== Nov 23 02:58:27 localhost certmonger[39728]: -----END CERTIFICATE----- Nov 23 02:58:27 localhost certmonger[39728]: ". Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Certificate submission still ongoing. Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Certificate submission postprocessing complete. Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Child status = 0. Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Child output: Nov 23 02:58:27 localhost certmonger[39044]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nlqeHBiHFg0xlzuhuwkKbsG1DBbyPKO5JKg==\n-----END CERTIFICATE-----\n","key_checked":true} Nov 23 02:58:27 localhost certmonger[39044]: " Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Issued certificate is "-----BEGIN CERTIFICATE----- Nov 23 02:58:27 localhost certmonger[39044]: MIIFVTCCA72gAwIBAgIBFjANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:27 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:27 localhost certmonger[39044]: NTgyNloXDTI3MTEyNDA3NTgyNlowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Nov 23 02:58:27 localhost certmonger[39044]: BAMMIW5wMDAwNTUzMjYwMC5zdG9yYWdlbWdtdC5vb28udGVzdDCCASIwDQYJKoZI Nov 23 02:58:27 localhost certmonger[39044]: hvcNAQEBBQADggEPADCCAQoCggEBAK4v7HbP7ehgA6CR8DWVn6zOFAXaLSVEKNWE Nov 23 02:58:27 localhost certmonger[39044]: 36XQ0xk0UEp5Bzds0GoUhpIGtudR+RhiN09oprTD1fu0talBUNwK/G1HK2dzm/kE Nov 23 02:58:27 localhost certmonger[39044]: xgULROUnLNxJNHrg3HMHUkpub0p4VVB9BOxL/JsZnI/kMAzB/Vd8Mr7opu+/ydj0 Nov 23 02:58:27 localhost certmonger[39044]: TmRxed3CRbaJ16GLGRsWTmFgwwfHvCKZG9zlYhIzwWCZ25HyXNw0t7IgVpZbB7A5 Nov 23 02:58:27 localhost certmonger[39044]: 7myPkB5/UyjRJr/s8i0q6T4V7cQfqras4wGGQCYubBDJ9518dd5h+IRoHLd7ckxw Nov 23 02:58:27 localhost certmonger[39044]: GkxwpY01hyq0Ndf+dt2KUHtxdIhK/AKoI9zRKh3GV0e58BcEnPMCAwEAAaOCAeYw Nov 23 02:58:27 localhost certmonger[39044]: ggHiMB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEB Nov 23 02:58:27 localhost certmonger[39044]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Nov 23 02:58:27 localhost certmonger[39044]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Nov 23 02:58:27 localhost certmonger[39044]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Nov 23 02:58:27 localhost certmonger[39044]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Nov 23 02:58:27 localhost certmonger[39044]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFNWwky5z2HbTYeBsV4Uch/Nr Nov 23 02:58:27 localhost certmonger[39044]: kEOYMIG/BgNVHREEgbcwgbSCIW5wMDAwNTUzMjYwMC5zdG9yYWdlbWdtdC5vb28u Nov 23 02:58:27 localhost certmonger[39044]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTMyNjAwLnN0b3JhZ2Vt Nov 23 02:58:27 localhost certmonger[39044]: Z210Lm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Nov 23 02:58:27 localhost certmonger[39044]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1MzI2MDAuc3RvcmFnZW1nbXQub29v Nov 23 02:58:27 localhost certmonger[39044]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAE8+GqV3R2qI119VoHUFjeZ2D7mc07no Nov 23 02:58:27 localhost certmonger[39044]: JDL2AcRsFVZIileCKFTamABlcTpRMANlVOdyytVv+DUcKMwidp6nartyQqmfL9qn Nov 23 02:58:27 localhost certmonger[39044]: 7kRh7Y3RbPRFk5lJMDHBPBAeqU3/Tvj7y68MMNZZmhooD9qefkf+eMkvXkFbXunJ Nov 23 02:58:27 localhost certmonger[39044]: QQYlQ2jx9sIJwU0HUT3z0id1hcGuhMvy9UbG4CupC7uJTyfxfPUNkRkgM7PGi7Yo Nov 23 02:58:27 localhost certmonger[39044]: U4WlVwPoNXntZ7ffmTJ68NiM+3lS96AaaOmF926PGf63vyp4jHsaUFtgnny/K43W Nov 23 02:58:27 localhost certmonger[39044]: h3tpiOSkKonEDPU+Y7OgUzgTKGhx8V4Mam6JXlDsupOE6VxGxK67VEY6umRQnQlm Nov 23 02:58:27 localhost certmonger[39044]: xEAyVq7hQ164BpC2rmorTq5MzM/FtzfKurLFLKu18zVo/KcJGhOvBplCzyuaHXmH Nov 23 02:58:27 localhost certmonger[39044]: ayzdnDhQYPJMTQMazGRcMKOCCKxL39gqi3dXi4KSQRxuqlgivpYuvHI5PzlIzRtb Nov 23 02:58:27 localhost certmonger[39044]: lqeHBiHFg0xlzuhuwkKbsG1DBbyPKO5JKg== Nov 23 02:58:27 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:27 localhost certmonger[39044]: ". Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Certificate issued (0 chain certificates, 0 roots). Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] No hooks set for pre-save command. Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost certmonger[39736]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075826 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost python3[39752]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005532600.internalapi.ooo.test'] principal=['HTTP/np0005532600.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost certmonger[39044]: 2025-11-23 07:58:27 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:27 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005532600.internalapi.ooo.test" for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005532600.internalapi.ooo.test Nov 23 02:58:28 localhost certmonger[39762]: " for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005532600.internalapi.ooo.test@OOO.TEST Nov 23 02:58:28 localhost certmonger[39762]: " for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Nov 23 02:58:28 localhost certmonger[39762]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTMyNjAwLmludGVybmFsYXBp Nov 23 02:58:28 localhost certmonger[39762]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkDvkGPd8 Nov 23 02:58:28 localhost certmonger[39762]: Hw6Cwe0pwZnM1CiibrLL3NIUDrsxHKPqh+efyWF6Zw9JgWaFBz/GcXnwsrynbpNN Nov 23 02:58:28 localhost certmonger[39762]: SLMJp7sroQO+I1rCrmkmU0NaWm7lH8bSjCE9mjewWKznGg2YKqxvUcRuLqYesMSN Nov 23 02:58:28 localhost certmonger[39762]: oBA+VvTm5eh+GchRJatypyCTzEK5frmC3Gk5pqJ3CUIVNQQS9HQVCtMM+QBgxYzS Nov 23 02:58:28 localhost certmonger[39762]: YSOzML5RUOKJgnpNNdRVPDCFoGArgk6cGvjWN6uh7aXcwtbXfEkBDSf3OyZtToey Nov 23 02:58:28 localhost certmonger[39762]: 7ggowuClsHz+rYfX47RPHtIMcB8A+7Zzm4H28czgPZypxMqdmvc0J0kxZEK8btvx Nov 23 02:58:28 localhost certmonger[39762]: JINYxvDCIR77/QIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAx Nov 23 02:58:28 localhost certmonger[39762]: ADIAMwAwADcANQA4ADIANzCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Nov 23 02:58:28 localhost certmonger[39762]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1MzI2MDAuaW50ZXJuYWxhcGkub29v Nov 23 02:58:28 localhost certmonger[39762]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTUzMjYwMC5pbnRlcm5h Nov 23 02:58:28 localhost certmonger[39762]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Nov 23 02:58:28 localhost certmonger[39762]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTMyNjAwLmludGVybmFsYXBpLm9v Nov 23 02:58:28 localhost certmonger[39762]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Nov 23 02:58:28 localhost certmonger[39762]: AjAAMB0GA1UdDgQWBBRimeqNl8lzkh9HHKgw2ys/KQ+Q5zANBgkqhkiG9w0BAQsF Nov 23 02:58:28 localhost certmonger[39762]: AAOCAQEAE3x3CPoFf0q0dbUuYqXk8AfjGXVz4kofWpH8IZra4LITMMNQfegymBvA Nov 23 02:58:28 localhost certmonger[39762]: hwYWW1ObtraSaTxLgWTNNm+NwjYbwHFARWaOg5QrMy0ffMdVIoi2XaSEtf5L3EFw Nov 23 02:58:28 localhost certmonger[39762]: sSPBiW/6Q19x7NL8rgxH8jw5Xef9e6dYZXmThkEZXhSo5qEE8df9nBkLxnovBO91 Nov 23 02:58:28 localhost certmonger[39762]: fTJ+Uyad45G49fSE/lPK62f/xZbeIzP1ei+AYP8pBDSs+yGn6qOAT8qa9P31KREZ Nov 23 02:58:28 localhost certmonger[39762]: IEmjDDQVdTUidI89SqTNK8DrGngLLVXQHNSPGs1HPjDeGSnl6IWrjuT2/GimHuDy Nov 23 02:58:28 localhost certmonger[39762]: UthbqIrR95G7XhtE/8r3VXmNwpyPpw== Nov 23 02:58:28 localhost certmonger[39762]: -----END CERTIFICATE REQUEST----- Nov 23 02:58:28 localhost certmonger[39762]: " for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_SPKAC" to "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" for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAkDvkGPd8Hw6Cwe0pwZnM1CiibrLL3NIUDrsxHKPqh+efyWF6Zw9JgWaFBz/GcXnwsrynbpNNSLMJp7sroQO+I1rCrmkmU0NaWm7lH8bSjCE9mjewWKznGg2YKqxvUcRuLqYesMSNoBA+VvTm5eh+GchRJatypyCTzEK5frmC3Gk5pqJ3CUIVNQQS9HQVCtMM+QBgxYzSYSOzML5RUOKJgnpNNdRVPDCFoGArgk6cGvjWN6uh7aXcwtbXfEkBDSf3OyZtToey7ggowuClsHz+rYfX47RPHtIMcB8A+7Zzm4H28czgPZypxMqdmvc0J0kxZEK8btvxJINYxvDCIR77/QIDAQAB" for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:28 localhost certmonger[39762]: 2025-11-23 07:58:28 [39762] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost certmonger[39762]: Submitting request to "https://ipa.ooo.test/ipa/json". Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost certmonger[39762]: Certificate: "MIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3NTgyOFoXDTI3MTEyNDA3NTgyOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNVBAMMIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJA75Bj3fB8OgsHtKcGZzNQoom6yy9zSFA67MRyj6ofnn8lhemcPSYFmhQc/xnF58LK8p26TTUizCae7K6EDviNawq5pJlNDWlpu5R/G0owhPZo3sFis5xoNmCqsb1HEbi6mHrDEjaAQPlb05uXofhnIUSWrcqcgk8xCuX65gtxpOaaidwlCFTUEEvR0FQrTDPkAYMWM0mEjszC+UVDiiYJ6TTXUVTwwhaBgK4JOnBr41jeroe2l3MLW13xJAQ0n9zsmbU6Hsu4IKMLgpbB8/q2H1+O0Tx7SDHAfAPu2c5uB9vHM4D2cqcTKnZr3NCdJMWRCvG7b8SSDWMbwwiEe+/0CAwEAAaOCAeYwggHiMB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFF4TFBAs7/1UQspgcl36gWXzMRUMIG/BgNVHREEgbcwgbSCIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28udGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTMyNjAwLmludGVybmFsYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1ShNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1MzI2MDAuaW50ZXJuYWxhcGkub29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBABTgOFEl11M5jllfbF6GBQnAfp3p3nvWij4MCKbC6RtiYJEwHQn4UQWfpwA7Os83RBa0x8r8OeI+o2E0dsh50K2UbhLBacl70LvD1n5ccYuUCb/4KxjD0owvmkDQtwOagNHvEitct/nuu/HrXsKstIMZBxSdzzUIh4auoSYwClLXSdCgj2wGZutzyoFiNofIdPc0iqEnpehfJ5tjswJ/AwhEqQuvTyJmNp853ab2rx4kx7ffaIOXbt/jQp9anhcIcW6jf8IBcQlK4Wj7hl4Fp7CszZSWc4HeSai1OIQgpKgvXjtODKEjE6z/UARG6AX1K3BkN76iDIn4EbkqZHh/2mWDI78upaVv3fsE9p/6KHwrfT6zuvtedY05/aURVBEgLu264QjyTFyiCJoPr3uKNUNLisfsTjBFWj+WUo3YeEgq4+4B3KPSQ/1s6RGebqlWN1i/U3TTtHVk+gsCCzlQJok5/yV2AkhMbm5stkmncdMQDYcsKlV8oA5zY42GF64p+w==" Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Certificate submission still ongoing. Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Certificate submission attempt complete. Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Child status = 0. Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Child output: Nov 23 02:58:28 localhost certmonger[39044]: "-----BEGIN CERTIFICATE----- Nov 23 02:58:28 localhost certmonger[39044]: MIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:28 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:28 localhost certmonger[39044]: NTgyOFoXDTI3MTEyNDA3NTgyOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Nov 23 02:58:28 localhost certmonger[39044]: BAMMIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Nov 23 02:58:28 localhost certmonger[39044]: hvcNAQEBBQADggEPADCCAQoCggEBAJA75Bj3fB8OgsHtKcGZzNQoom6yy9zSFA67 Nov 23 02:58:28 localhost certmonger[39044]: MRyj6ofnn8lhemcPSYFmhQc/xnF58LK8p26TTUizCae7K6EDviNawq5pJlNDWlpu Nov 23 02:58:28 localhost certmonger[39044]: 5R/G0owhPZo3sFis5xoNmCqsb1HEbi6mHrDEjaAQPlb05uXofhnIUSWrcqcgk8xC Nov 23 02:58:28 localhost certmonger[39044]: uX65gtxpOaaidwlCFTUEEvR0FQrTDPkAYMWM0mEjszC+UVDiiYJ6TTXUVTwwhaBg Nov 23 02:58:28 localhost certmonger[39044]: K4JOnBr41jeroe2l3MLW13xJAQ0n9zsmbU6Hsu4IKMLgpbB8/q2H1+O0Tx7SDHAf Nov 23 02:58:28 localhost certmonger[39044]: APu2c5uB9vHM4D2cqcTKnZr3NCdJMWRCvG7b8SSDWMbwwiEe+/0CAwEAAaOCAeYw Nov 23 02:58:28 localhost certmonger[39044]: ggHiMB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEB Nov 23 02:58:28 localhost certmonger[39044]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Nov 23 02:58:28 localhost certmonger[39044]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Nov 23 02:58:28 localhost certmonger[39044]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Nov 23 02:58:28 localhost certmonger[39044]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Nov 23 02:58:28 localhost certmonger[39044]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFF4TFBAs7/1UQspgcl36gWX Nov 23 02:58:28 localhost certmonger[39044]: zMRUMIG/BgNVHREEgbcwgbSCIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28u Nov 23 02:58:28 localhost certmonger[39044]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTMyNjAwLmludGVybmFs Nov 23 02:58:28 localhost certmonger[39044]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Nov 23 02:58:28 localhost certmonger[39044]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1MzI2MDAuaW50ZXJuYWxhcGkub29v Nov 23 02:58:28 localhost certmonger[39044]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABTgOFEl11M5jllfbF6GBQnAfp3p3nvW Nov 23 02:58:28 localhost certmonger[39044]: ij4MCKbC6RtiYJEwHQn4UQWfpwA7Os83RBa0x8r8OeI+o2E0dsh50K2UbhLBacl7 Nov 23 02:58:28 localhost certmonger[39044]: 0LvD1n5ccYuUCb/4KxjD0owvmkDQtwOagNHvEitct/nuu/HrXsKstIMZBxSdzzUI Nov 23 02:58:28 localhost certmonger[39044]: h4auoSYwClLXSdCgj2wGZutzyoFiNofIdPc0iqEnpehfJ5tjswJ/AwhEqQuvTyJm Nov 23 02:58:28 localhost certmonger[39044]: Np853ab2rx4kx7ffaIOXbt/jQp9anhcIcW6jf8IBcQlK4Wj7hl4Fp7CszZSWc4He Nov 23 02:58:28 localhost certmonger[39044]: Sai1OIQgpKgvXjtODKEjE6z/UARG6AX1K3BkN76iDIn4EbkqZHh/2mWDI78upaVv Nov 23 02:58:28 localhost certmonger[39044]: 3fsE9p/6KHwrfT6zuvtedY05/aURVBEgLu264QjyTFyiCJoPr3uKNUNLisfsTjBF Nov 23 02:58:28 localhost certmonger[39044]: Wj+WUo3YeEgq4+4B3KPSQ/1s6RGebqlWN1i/U3TTtHVk+gsCCzlQJok5/yV2AkhM Nov 23 02:58:28 localhost certmonger[39044]: bm5stkmncdMQDYcsKlV8oA5zY42GF64p+w== Nov 23 02:58:28 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:28 localhost certmonger[39044]: " Nov 23 02:58:28 localhost certmonger[39764]: 2025-11-23 07:58:28 [39764] Postprocessing output "-----BEGIN CERTIFICATE----- Nov 23 02:58:28 localhost certmonger[39764]: MIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:28 localhost certmonger[39764]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:28 localhost certmonger[39764]: NTgyOFoXDTI3MTEyNDA3NTgyOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Nov 23 02:58:28 localhost certmonger[39764]: BAMMIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Nov 23 02:58:28 localhost certmonger[39764]: hvcNAQEBBQADggEPADCCAQoCggEBAJA75Bj3fB8OgsHtKcGZzNQoom6yy9zSFA67 Nov 23 02:58:28 localhost certmonger[39764]: MRyj6ofnn8lhemcPSYFmhQc/xnF58LK8p26TTUizCae7K6EDviNawq5pJlNDWlpu Nov 23 02:58:28 localhost certmonger[39764]: 5R/G0owhPZo3sFis5xoNmCqsb1HEbi6mHrDEjaAQPlb05uXofhnIUSWrcqcgk8xC Nov 23 02:58:28 localhost certmonger[39764]: uX65gtxpOaaidwlCFTUEEvR0FQrTDPkAYMWM0mEjszC+UVDiiYJ6TTXUVTwwhaBg Nov 23 02:58:28 localhost certmonger[39764]: K4JOnBr41jeroe2l3MLW13xJAQ0n9zsmbU6Hsu4IKMLgpbB8/q2H1+O0Tx7SDHAf Nov 23 02:58:28 localhost certmonger[39764]: APu2c5uB9vHM4D2cqcTKnZr3NCdJMWRCvG7b8SSDWMbwwiEe+/0CAwEAAaOCAeYw Nov 23 02:58:28 localhost certmonger[39764]: ggHiMB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEB Nov 23 02:58:28 localhost certmonger[39764]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Nov 23 02:58:28 localhost certmonger[39764]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Nov 23 02:58:28 localhost certmonger[39764]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Nov 23 02:58:28 localhost certmonger[39764]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Nov 23 02:58:28 localhost certmonger[39764]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFF4TFBAs7/1UQspgcl36gWX Nov 23 02:58:28 localhost certmonger[39764]: zMRUMIG/BgNVHREEgbcwgbSCIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28u Nov 23 02:58:28 localhost certmonger[39764]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTMyNjAwLmludGVybmFs Nov 23 02:58:28 localhost certmonger[39764]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Nov 23 02:58:28 localhost certmonger[39764]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1MzI2MDAuaW50ZXJuYWxhcGkub29v Nov 23 02:58:28 localhost certmonger[39764]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABTgOFEl11M5jllfbF6GBQnAfp3p3nvW Nov 23 02:58:28 localhost certmonger[39764]: ij4MCKbC6RtiYJEwHQn4UQWfpwA7Os83RBa0x8r8OeI+o2E0dsh50K2UbhLBacl7 Nov 23 02:58:28 localhost certmonger[39764]: 0LvD1n5ccYuUCb/4KxjD0owvmkDQtwOagNHvEitct/nuu/HrXsKstIMZBxSdzzUI Nov 23 02:58:28 localhost certmonger[39764]: h4auoSYwClLXSdCgj2wGZutzyoFiNofIdPc0iqEnpehfJ5tjswJ/AwhEqQuvTyJm Nov 23 02:58:28 localhost certmonger[39764]: Np853ab2rx4kx7ffaIOXbt/jQp9anhcIcW6jf8IBcQlK4Wj7hl4Fp7CszZSWc4He Nov 23 02:58:28 localhost certmonger[39764]: Sai1OIQgpKgvXjtODKEjE6z/UARG6AX1K3BkN76iDIn4EbkqZHh/2mWDI78upaVv Nov 23 02:58:28 localhost certmonger[39764]: 3fsE9p/6KHwrfT6zuvtedY05/aURVBEgLu264QjyTFyiCJoPr3uKNUNLisfsTjBF Nov 23 02:58:28 localhost certmonger[39764]: Wj+WUo3YeEgq4+4B3KPSQ/1s6RGebqlWN1i/U3TTtHVk+gsCCzlQJok5/yV2AkhM Nov 23 02:58:28 localhost certmonger[39764]: bm5stkmncdMQDYcsKlV8oA5zY42GF64p+w== Nov 23 02:58:28 localhost certmonger[39764]: -----END CERTIFICATE----- Nov 23 02:58:28 localhost certmonger[39764]: ". Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Certificate submission still ongoing. Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Certificate submission postprocessing complete. Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Child status = 0. Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Child output: Nov 23 02:58:28 localhost certmonger[39044]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u\nVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3\nNTgyOFoXDTI3MTEyNDA3NTgyOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV\nBAMMIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI\nhvcNAQEBBQADggEPADCCAQoCggEBAJA75Bj3fB8OgsHtKcGZzNQoom6yy9zSFA67\nMRyj6ofnn8lhemcPSYFmhQc/xnF58LK8p26TTUizCae7K6EDviNawq5pJlNDWlpu\n5R/G0owhPZo3sFis5xoNmCqsb1HEbi6mHrDEjaAQPlb05uXofhnIUSWrcqcgk8xC\nuX65gtxpOaaidwlCFTUEEvR0FQrTDPkAYMWM0mEjszC+UVDiiYJ6TTXUVTwwhaBg\nK4JOnBr41jeroe2l3MLW13xJAQ0n9zsmbU6Hsu4IKMLgpbB8/q2H1+O0Tx7SDHAf\nAPu2c5uB9vHM4D2cqcTKnZr3NCdJMWRCvG7b8SSDWMbwwiEe+/0CAwEAAaOCAeYw\nggHiMB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEB\nBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw\nMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw\ncwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js\nL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD\nZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFF4TFBAs7/1UQspgcl36gWX\nzMRUMIG/BgNVHREEgbcwgbSCIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28u\ndGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTMyNjAwLmludGVybmFs\nYXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh\nNDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1MzI2MDAuaW50ZXJuYWxhcGkub29v\nLnRlc3QwDQYJKoZIhvcNAQELBQADggGBABTgOFEl11M5jllfbF6GBQnAfp3p3nvW\nij4MCKbC6RtiYJEwHQn4UQWfpwA7Os83RBa0x8r8OeI+o2E0dsh50K2UbhLBacl7\n0LvD1n5ccYuUCb/4KxjD0owvmkDQtwOagNHvEitct/nuu/HrXsKstIMZBxSdzzUI\nh4auoSYwClLXSdCgj2wGZutzyoFiNofIdPc0iqEnpehfJ5tjswJ/AwhEqQuvTyJm\nNp853ab2rx4kx7ffaIOXbt/jQp9anhcIcW6jf8IBcQlK4Wj7hl4Fp7CszZSWc4He\nSai1OIQgpKgvXjtODKEjE6z/UARG6AX1K3BkN76iDIn4EbkqZHh/2mWDI78upaVv\n3fsE9p/6KHwrfT6zuvtedY05/aURVBEgLu264QjyTFyiCJoPr3uKNUNLisfsTjBF\nWj+WUo3YeEgq4+4B3KPSQ/1s6RGebqlWN1i/U3TTtHVk+gsCCzlQJok5/yV2AkhM\nbm5stkmncdMQDYcsKlV8oA5zY42GF64p+w==\n-----END CERTIFICATE-----\n","key_checked":true} Nov 23 02:58:28 localhost certmonger[39044]: " Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Issued certificate is "-----BEGIN CERTIFICATE----- Nov 23 02:58:28 localhost certmonger[39044]: MIIFVTCCA72gAwIBAgIBGTANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:28 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:28 localhost certmonger[39044]: NTgyOFoXDTI3MTEyNDA3NTgyOFowPzERMA8GA1UECgwIT09PLlRFU1QxKjAoBgNV Nov 23 02:58:28 localhost certmonger[39044]: BAMMIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28udGVzdDCCASIwDQYJKoZI Nov 23 02:58:28 localhost certmonger[39044]: hvcNAQEBBQADggEPADCCAQoCggEBAJA75Bj3fB8OgsHtKcGZzNQoom6yy9zSFA67 Nov 23 02:58:28 localhost certmonger[39044]: MRyj6ofnn8lhemcPSYFmhQc/xnF58LK8p26TTUizCae7K6EDviNawq5pJlNDWlpu Nov 23 02:58:28 localhost certmonger[39044]: 5R/G0owhPZo3sFis5xoNmCqsb1HEbi6mHrDEjaAQPlb05uXofhnIUSWrcqcgk8xC Nov 23 02:58:28 localhost certmonger[39044]: uX65gtxpOaaidwlCFTUEEvR0FQrTDPkAYMWM0mEjszC+UVDiiYJ6TTXUVTwwhaBg Nov 23 02:58:28 localhost certmonger[39044]: K4JOnBr41jeroe2l3MLW13xJAQ0n9zsmbU6Hsu4IKMLgpbB8/q2H1+O0Tx7SDHAf Nov 23 02:58:28 localhost certmonger[39044]: APu2c5uB9vHM4D2cqcTKnZr3NCdJMWRCvG7b8SSDWMbwwiEe+/0CAwEAAaOCAeYw Nov 23 02:58:28 localhost certmonger[39044]: ggHiMB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEB Nov 23 02:58:28 localhost certmonger[39044]: BC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3Nw Nov 23 02:58:28 localhost certmonger[39044]: MA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw Nov 23 02:58:28 localhost certmonger[39044]: cwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3Js Nov 23 02:58:28 localhost certmonger[39044]: L01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVD Nov 23 02:58:28 localhost certmonger[39044]: ZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFFF4TFBAs7/1UQspgcl36gWX Nov 23 02:58:28 localhost certmonger[39044]: zMRUMIG/BgNVHREEgbcwgbSCIW5wMDAwNTUzMjYwMC5pbnRlcm5hbGFwaS5vb28u Nov 23 02:58:28 localhost certmonger[39044]: dGVzdKA/BgorBgEEAYI3FAIDoDEML0hUVFAvbnAwMDA1NTMyNjAwLmludGVybmFs Nov 23 02:58:28 localhost certmonger[39044]: YXBpLm9vby50ZXN0QE9PTy5URVNUoE4GBisGAQUCAqBEMEKgChsIT09PLlRFU1Sh Nov 23 02:58:28 localhost certmonger[39044]: NDAyoAMCAQGhKzApGwRIVFRQGyFucDAwMDU1MzI2MDAuaW50ZXJuYWxhcGkub29v Nov 23 02:58:28 localhost certmonger[39044]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBABTgOFEl11M5jllfbF6GBQnAfp3p3nvW Nov 23 02:58:28 localhost certmonger[39044]: ij4MCKbC6RtiYJEwHQn4UQWfpwA7Os83RBa0x8r8OeI+o2E0dsh50K2UbhLBacl7 Nov 23 02:58:28 localhost certmonger[39044]: 0LvD1n5ccYuUCb/4KxjD0owvmkDQtwOagNHvEitct/nuu/HrXsKstIMZBxSdzzUI Nov 23 02:58:28 localhost certmonger[39044]: h4auoSYwClLXSdCgj2wGZutzyoFiNofIdPc0iqEnpehfJ5tjswJ/AwhEqQuvTyJm Nov 23 02:58:28 localhost certmonger[39044]: Np853ab2rx4kx7ffaIOXbt/jQp9anhcIcW6jf8IBcQlK4Wj7hl4Fp7CszZSWc4He Nov 23 02:58:28 localhost certmonger[39044]: Sai1OIQgpKgvXjtODKEjE6z/UARG6AX1K3BkN76iDIn4EbkqZHh/2mWDI78upaVv Nov 23 02:58:28 localhost certmonger[39044]: 3fsE9p/6KHwrfT6zuvtedY05/aURVBEgLu264QjyTFyiCJoPr3uKNUNLisfsTjBF Nov 23 02:58:28 localhost certmonger[39044]: Wj+WUo3YeEgq4+4B3KPSQ/1s6RGebqlWN1i/U3TTtHVk+gsCCzlQJok5/yV2AkhM Nov 23 02:58:28 localhost certmonger[39044]: bm5stkmncdMQDYcsKlV8oA5zY42GF64p+w== Nov 23 02:58:28 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:28 localhost certmonger[39044]: ". Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Certificate issued (0 chain certificates, 0 roots). Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] No hooks set for pre-save command. Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost certmonger[39772]: Certificate in file "/etc/pki/tls/certs/httpd-internal_api.crt" issued by CA and saved. Nov 23 02:58:28 localhost certmonger[39044]: 2025-11-23 07:58:28 [39044] Wrote to /var/lib/certmonger/requests/20251123075827 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:28 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost python3[39788]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005532600.external.ooo.test'] principal=['HTTP/np0005532600.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 547cddab-f544-422e-a419-c50bc6041c0f Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005532600.external.ooo.test" for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005532600.external.ooo.test Nov 23 02:58:29 localhost certmonger[39798]: " for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005532600.external.ooo.test@OOO.TEST Nov 23 02:58:29 localhost certmonger[39798]: " for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Nov 23 02:58:29 localhost certmonger[39798]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTMyNjAwLmV4dGVybmFsLm9v Nov 23 02:58:29 localhost certmonger[39798]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzMk8HTLvW4Z4 Nov 23 02:58:29 localhost certmonger[39798]: xd1FvPohdsih+e0K1N42UQpMZxk/k6gzRloYJvO78rB9RMe2z2arZilP+s2RLQpk Nov 23 02:58:29 localhost certmonger[39798]: QZGnA0wKpSm3GLsw4+PmcSN+pcTJte5u/bdxZYCDhHZ35PJAnhPjvdQoQ9Ekx+bS Nov 23 02:58:29 localhost certmonger[39798]: ayLdWtSFM4Wrdk9QRhMvJ6lFOEGwBTN8k9nUmC2mag0lXN+2ROozmnsTgiSdKzWG Nov 23 02:58:29 localhost certmonger[39798]: lw4aROwFEyYyx1ubniRpF1++H5gP1s7bTQ6A2cwNk/hbxXcl5pEPVqEwJWv5+q7A Nov 23 02:58:29 localhost certmonger[39798]: BC+j8aQYINiVmXsKUEhX2Xw/Xznnv0IChadkHNLqdM0X+Y64P87PT2YFq5YZm/TF Nov 23 02:58:29 localhost certmonger[39798]: AdAjZdx3bwIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAxADIA Nov 23 02:58:29 localhost certmonger[39798]: MwAwADcANQA4ADIAOTCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Nov 23 02:58:29 localhost certmonger[39798]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1MzI2MDAuZXh0ZXJuYWwub29vLnRlc3Sg Nov 23 02:58:29 localhost certmonger[39798]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTUzMjYwMC5leHRlcm5hbC5vb28u Nov 23 02:58:29 localhost certmonger[39798]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Nov 23 02:58:29 localhost certmonger[39798]: oSgwJhsESFRUUBsebnAwMDA1NTMyNjAwLmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Nov 23 02:58:29 localhost certmonger[39798]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Nov 23 02:58:29 localhost certmonger[39798]: BBRimeqNl8lzkh9HHKgw2ys/KQ+Q5zANBgkqhkiG9w0BAQsFAAOCAQEAhc8amyrN Nov 23 02:58:29 localhost certmonger[39798]: eDpD4ndybwvVtAkuk1R5HIAtT7iIPFZs8jf3v8a32IlGRteP1nIEvIP9qwx3sM17 Nov 23 02:58:29 localhost certmonger[39798]: cjwUWeUdPjGE5Bq3aQHVHZinbk5//Ztb91Ll0uiHVNnqiKa/9EJ4HB00z70c7JY0 Nov 23 02:58:29 localhost certmonger[39798]: LaIuoMz4Y5LGq+dtymMVF55U/yTuI1lWifaRf4+BCltFJwNPqvsWy2NT3gyrjrug Nov 23 02:58:29 localhost certmonger[39798]: bQj6GUg61t7ExGM29zBw+zAb3eCDDnmRRRNFrCsiszPkvUjEnAB1/kI1FO0/sUQJ Nov 23 02:58:29 localhost certmonger[39798]: UWSkjLGLhZO9k06uijGuKmOgJq86pBpkcFPPNtg5jmQV18eZkEgxXoLt12Ui2BfP Nov 23 02:58:29 localhost certmonger[39798]: Gk8JAAQ5c30zbg== Nov 23 02:58:29 localhost certmonger[39798]: -----END CERTIFICATE REQUEST----- Nov 23 02:58:29 localhost certmonger[39798]: " for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDMyTwdMu9bhnjF3UW8+iF2yKH57QrU3jZRCkxnGT+TqDNGWhgm87vysH1Ex7bPZqtmKU/6zZEtCmRBkacDTAqlKbcYuzDj4+ZxI36lxMm17m79t3FlgIOEdnfk8kCeE+O91ChD0STH5tJrIt1a1IUzhat2T1BGEy8nqUU4QbAFM3yT2dSYLaZqDSVc37ZE6jOaexOCJJ0rNYaXDhpE7AUTJjLHW5ueJGkXX74fmA/WzttNDoDZzA2T+FvFdyXmkQ9WoTAla/n6rsAEL6PxpBgg2JWZewpQSFfZfD9fOee/QgKFp2Qc0up0zRf5jrg/zs9PZgWrlhmb9MUB0CNl3HdvAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEAVvTAv4tElDJvh+nL2QgoUdAQbImj2AlRPeTMB5ppBG6qgjIb6vrgDeCN891dueZ4IU5JamdRQOFlghajpRvZxHAZfqW9lDGsgQ1XL1AYWHYpI8zrj/DIJODXtIoH1fIfJmlW7q3f32VACPTmEyuaumuSr1SdzUVVh92NjxNd/chrDDVaKmZ3Xww1KtCnpp5TU5/jgoRIlVpssGnrJ5mV+SDuwccLAx5+Cx4Qt86bhO9PlOh2iEbtdoSsFggOGq62ayh4HbROZQaoG4ahDXso7nXdGtksN7avWFZ6C1MHyIWEJa4vYwCIca8xBZw00EHLTv8eYFUgjInG76YdJIW5HA==" for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzMk8HTLvW4Z4xd1FvPohdsih+e0K1N42UQpMZxk/k6gzRloYJvO78rB9RMe2z2arZilP+s2RLQpkQZGnA0wKpSm3GLsw4+PmcSN+pcTJte5u/bdxZYCDhHZ35PJAnhPjvdQoQ9Ekx+bSayLdWtSFM4Wrdk9QRhMvJ6lFOEGwBTN8k9nUmC2mag0lXN+2ROozmnsTgiSdKzWGlw4aROwFEyYyx1ubniRpF1++H5gP1s7bTQ6A2cwNk/hbxXcl5pEPVqEwJWv5+q7ABC+j8aQYINiVmXsKUEhX2Xw/Xznnv0IChadkHNLqdM0X+Y64P87PT2YFq5YZm/TFAdAjZdx3bwIDAQAB" for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:29 localhost certmonger[39798]: 2025-11-23 07:58:29 [39798] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Nov 23 02:58:29 localhost certmonger[39044]: 2025-11-23 07:58:29 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost certmonger[39798]: Submitting request to "https://ipa.ooo.test/ipa/json". Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 137a8077-ec3b-4bca-95b2-43331a67d163 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:29 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 455ae718-2b75-4aa9-9a02-3951621c69b9 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost certmonger[39798]: Certificate: "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" Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Certificate submission still ongoing. Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Certificate submission attempt complete. Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Child status = 0. Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Child output: Nov 23 02:58:30 localhost certmonger[39044]: "-----BEGIN CERTIFICATE----- Nov 23 02:58:30 localhost certmonger[39044]: MIIFSTCCA7GgAwIBAgIBHDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:30 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:30 localhost certmonger[39044]: NTgyOVoXDTI3MTEyNDA3NTgyOVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Nov 23 02:58:30 localhost certmonger[39044]: BAMMHm5wMDAwNTUzMjYwMC5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Nov 23 02:58:30 localhost certmonger[39044]: AQEBBQADggEPADCCAQoCggEBAMzJPB0y71uGeMXdRbz6IXbIofntCtTeNlEKTGcZ Nov 23 02:58:30 localhost certmonger[39044]: P5OoM0ZaGCbzu/KwfUTHts9mq2YpT/rNkS0KZEGRpwNMCqUptxi7MOPj5nEjfqXE Nov 23 02:58:30 localhost certmonger[39044]: ybXubv23cWWAg4R2d+TyQJ4T473UKEPRJMfm0msi3VrUhTOFq3ZPUEYTLyepRThB Nov 23 02:58:30 localhost certmonger[39044]: sAUzfJPZ1JgtpmoNJVzftkTqM5p7E4IknSs1hpcOGkTsBRMmMsdbm54kaRdfvh+Y Nov 23 02:58:30 localhost certmonger[39044]: D9bO200OgNnMDZP4W8V3JeaRD1ahMCVr+fquwAQvo/GkGCDYlZl7ClBIV9l8P185 Nov 23 02:58:30 localhost certmonger[39044]: 579CAoWnZBzS6nTNF/mOuD/Oz09mBauWGZv0xQHQI2Xcd28CAwEAAaOCAd0wggHZ Nov 23 02:58:30 localhost certmonger[39044]: MB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEBBC4w Nov 23 02:58:30 localhost certmonger[39044]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Nov 23 02:58:30 localhost certmonger[39044]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Nov 23 02:58:30 localhost certmonger[39044]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Nov 23 02:58:30 localhost certmonger[39044]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Nov 23 02:58:30 localhost certmonger[39044]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOT+lAjhHNoCO4C4NiwoWZbTmBS7 Nov 23 02:58:30 localhost certmonger[39044]: MIG2BgNVHREEga4wgauCHm5wMDAwNTUzMjYwMC5leHRlcm5hbC5vb28udGVzdKA8 Nov 23 02:58:30 localhost certmonger[39044]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTMyNjAwLmV4dGVybmFsLm9vby50 Nov 23 02:58:30 localhost certmonger[39044]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Nov 23 02:58:30 localhost certmonger[39044]: KDAmGwRIVFRQGx5ucDAwMDU1MzI2MDAuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Nov 23 02:58:30 localhost certmonger[39044]: hvcNAQELBQADggGBAK4RgwzWimzBslu1sY6NnF0kD5VBptpGC9iaAt3V5F946v6o Nov 23 02:58:30 localhost certmonger[39044]: RkgFUcz9Sopc6Dw0BHpgvzl3IfO9FbEzLWQJrXNodPT/LHs3A8cyRgSIn7m4OtS8 Nov 23 02:58:30 localhost certmonger[39044]: xjZMXYoE4tx2wpERrbPpyHX0On2vIRI6QK1zoQQzkcXK9tPVurSuClPhsjJ+/09K Nov 23 02:58:30 localhost certmonger[39044]: x404cP17DnIk0s+sygA/2QtaRZSraKXHVrWgFPcFad25wZ6QdlYVHVqrr6zuaIzj Nov 23 02:58:30 localhost certmonger[39044]: GU4xAGU6sc0YE+1maRMg6VHEuvUAhjwP88pgjdlK39g5v+B/TTU2IHsQfgzKrY00 Nov 23 02:58:30 localhost certmonger[39044]: pcytyBXGapQGG0RCwmyTijh0hb4GpIn68oNgX2nL8iuJm48qs1xIfVdbvtvuGZ5K Nov 23 02:58:30 localhost certmonger[39044]: cw3E4gax4bbyw24oaCPTX4oBeDd+wMSV8mMgqs+35OpuEsG+Jj04N8PVMuVjDWp7 Nov 23 02:58:30 localhost certmonger[39044]: /VtvM+jKMnxf8ibZM1Uklvg2J3nVzwcYA0F2296MKae+iSFbMBiX1fAKrri4YgkH Nov 23 02:58:30 localhost certmonger[39044]: Nz6gOJ2rO9j44aoADA== Nov 23 02:58:30 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:30 localhost certmonger[39044]: " Nov 23 02:58:30 localhost certmonger[39800]: 2025-11-23 07:58:30 [39800] Postprocessing output "-----BEGIN CERTIFICATE----- Nov 23 02:58:30 localhost certmonger[39800]: MIIFSTCCA7GgAwIBAgIBHDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:30 localhost certmonger[39800]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:30 localhost certmonger[39800]: NTgyOVoXDTI3MTEyNDA3NTgyOVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Nov 23 02:58:30 localhost certmonger[39800]: BAMMHm5wMDAwNTUzMjYwMC5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Nov 23 02:58:30 localhost certmonger[39800]: AQEBBQADggEPADCCAQoCggEBAMzJPB0y71uGeMXdRbz6IXbIofntCtTeNlEKTGcZ Nov 23 02:58:30 localhost certmonger[39800]: P5OoM0ZaGCbzu/KwfUTHts9mq2YpT/rNkS0KZEGRpwNMCqUptxi7MOPj5nEjfqXE Nov 23 02:58:30 localhost certmonger[39800]: ybXubv23cWWAg4R2d+TyQJ4T473UKEPRJMfm0msi3VrUhTOFq3ZPUEYTLyepRThB Nov 23 02:58:30 localhost certmonger[39800]: sAUzfJPZ1JgtpmoNJVzftkTqM5p7E4IknSs1hpcOGkTsBRMmMsdbm54kaRdfvh+Y Nov 23 02:58:30 localhost certmonger[39800]: D9bO200OgNnMDZP4W8V3JeaRD1ahMCVr+fquwAQvo/GkGCDYlZl7ClBIV9l8P185 Nov 23 02:58:30 localhost certmonger[39800]: 579CAoWnZBzS6nTNF/mOuD/Oz09mBauWGZv0xQHQI2Xcd28CAwEAAaOCAd0wggHZ Nov 23 02:58:30 localhost certmonger[39800]: MB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEBBC4w Nov 23 02:58:30 localhost certmonger[39800]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Nov 23 02:58:30 localhost certmonger[39800]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Nov 23 02:58:30 localhost certmonger[39800]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Nov 23 02:58:30 localhost certmonger[39800]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Nov 23 02:58:30 localhost certmonger[39800]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOT+lAjhHNoCO4C4NiwoWZbTmBS7 Nov 23 02:58:30 localhost certmonger[39800]: MIG2BgNVHREEga4wgauCHm5wMDAwNTUzMjYwMC5leHRlcm5hbC5vb28udGVzdKA8 Nov 23 02:58:30 localhost certmonger[39800]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTMyNjAwLmV4dGVybmFsLm9vby50 Nov 23 02:58:30 localhost certmonger[39800]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Nov 23 02:58:30 localhost certmonger[39800]: KDAmGwRIVFRQGx5ucDAwMDU1MzI2MDAuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Nov 23 02:58:30 localhost certmonger[39800]: hvcNAQELBQADggGBAK4RgwzWimzBslu1sY6NnF0kD5VBptpGC9iaAt3V5F946v6o Nov 23 02:58:30 localhost certmonger[39800]: RkgFUcz9Sopc6Dw0BHpgvzl3IfO9FbEzLWQJrXNodPT/LHs3A8cyRgSIn7m4OtS8 Nov 23 02:58:30 localhost certmonger[39800]: xjZMXYoE4tx2wpERrbPpyHX0On2vIRI6QK1zoQQzkcXK9tPVurSuClPhsjJ+/09K Nov 23 02:58:30 localhost certmonger[39800]: x404cP17DnIk0s+sygA/2QtaRZSraKXHVrWgFPcFad25wZ6QdlYVHVqrr6zuaIzj Nov 23 02:58:30 localhost certmonger[39800]: GU4xAGU6sc0YE+1maRMg6VHEuvUAhjwP88pgjdlK39g5v+B/TTU2IHsQfgzKrY00 Nov 23 02:58:30 localhost certmonger[39800]: pcytyBXGapQGG0RCwmyTijh0hb4GpIn68oNgX2nL8iuJm48qs1xIfVdbvtvuGZ5K Nov 23 02:58:30 localhost certmonger[39800]: cw3E4gax4bbyw24oaCPTX4oBeDd+wMSV8mMgqs+35OpuEsG+Jj04N8PVMuVjDWp7 Nov 23 02:58:30 localhost certmonger[39800]: /VtvM+jKMnxf8ibZM1Uklvg2J3nVzwcYA0F2296MKae+iSFbMBiX1fAKrri4YgkH Nov 23 02:58:30 localhost certmonger[39800]: Nz6gOJ2rO9j44aoADA== Nov 23 02:58:30 localhost certmonger[39800]: -----END CERTIFICATE----- Nov 23 02:58:30 localhost certmonger[39800]: ". Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Certificate submission still ongoing. Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Certificate submission postprocessing complete. Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Child status = 0. Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Child output: Nov 23 02:58:30 localhost certmonger[39044]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nNz6gOJ2rO9j44aoADA==\n-----END CERTIFICATE-----\n","key_checked":true} Nov 23 02:58:30 localhost certmonger[39044]: " Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Issued certificate is "-----BEGIN CERTIFICATE----- Nov 23 02:58:30 localhost certmonger[39044]: MIIFSTCCA7GgAwIBAgIBHDANBgkqhkiG9w0BAQsFADAzMREwDwYDVQQKDAhPT08u Nov 23 02:58:30 localhost certmonger[39044]: VEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB4XDTI1MTEyMzA3 Nov 23 02:58:30 localhost certmonger[39044]: NTgyOVoXDTI3MTEyNDA3NTgyOVowPDERMA8GA1UECgwIT09PLlRFU1QxJzAlBgNV Nov 23 02:58:30 localhost certmonger[39044]: BAMMHm5wMDAwNTUzMjYwMC5leHRlcm5hbC5vb28udGVzdDCCASIwDQYJKoZIhvcN Nov 23 02:58:30 localhost certmonger[39044]: AQEBBQADggEPADCCAQoCggEBAMzJPB0y71uGeMXdRbz6IXbIofntCtTeNlEKTGcZ Nov 23 02:58:30 localhost certmonger[39044]: P5OoM0ZaGCbzu/KwfUTHts9mq2YpT/rNkS0KZEGRpwNMCqUptxi7MOPj5nEjfqXE Nov 23 02:58:30 localhost certmonger[39044]: ybXubv23cWWAg4R2d+TyQJ4T473UKEPRJMfm0msi3VrUhTOFq3ZPUEYTLyepRThB Nov 23 02:58:30 localhost certmonger[39044]: sAUzfJPZ1JgtpmoNJVzftkTqM5p7E4IknSs1hpcOGkTsBRMmMsdbm54kaRdfvh+Y Nov 23 02:58:30 localhost certmonger[39044]: D9bO200OgNnMDZP4W8V3JeaRD1ahMCVr+fquwAQvo/GkGCDYlZl7ClBIV9l8P185 Nov 23 02:58:30 localhost certmonger[39044]: 579CAoWnZBzS6nTNF/mOuD/Oz09mBauWGZv0xQHQI2Xcd28CAwEAAaOCAd0wggHZ Nov 23 02:58:30 localhost certmonger[39044]: MB8GA1UdIwQYMBaAFHlnWuy6jlpijMQOqxqaGEkn4lQhMDoGCCsGAQUFBwEBBC4w Nov 23 02:58:30 localhost certmonger[39044]: LDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28udGVzdC9jYS9vY3NwMA4G Nov 23 02:58:30 localhost certmonger[39044]: A1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwcwYD Nov 23 02:58:30 localhost certmonger[39044]: VR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28udGVzdC9pcGEvY3JsL01h Nov 23 02:58:30 localhost certmonger[39044]: c3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNhMR4wHAYDVQQDDBVDZXJ0 Nov 23 02:58:30 localhost certmonger[39044]: aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFOT+lAjhHNoCO4C4NiwoWZbTmBS7 Nov 23 02:58:30 localhost certmonger[39044]: MIG2BgNVHREEga4wgauCHm5wMDAwNTUzMjYwMC5leHRlcm5hbC5vb28udGVzdKA8 Nov 23 02:58:30 localhost certmonger[39044]: BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTMyNjAwLmV4dGVybmFsLm9vby50 Nov 23 02:58:30 localhost certmonger[39044]: ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09PLlRFU1ShMTAvoAMCAQGh Nov 23 02:58:30 localhost certmonger[39044]: KDAmGwRIVFRQGx5ucDAwMDU1MzI2MDAuZXh0ZXJuYWwub29vLnRlc3QwDQYJKoZI Nov 23 02:58:30 localhost certmonger[39044]: hvcNAQELBQADggGBAK4RgwzWimzBslu1sY6NnF0kD5VBptpGC9iaAt3V5F946v6o Nov 23 02:58:30 localhost certmonger[39044]: RkgFUcz9Sopc6Dw0BHpgvzl3IfO9FbEzLWQJrXNodPT/LHs3A8cyRgSIn7m4OtS8 Nov 23 02:58:30 localhost certmonger[39044]: xjZMXYoE4tx2wpERrbPpyHX0On2vIRI6QK1zoQQzkcXK9tPVurSuClPhsjJ+/09K Nov 23 02:58:30 localhost certmonger[39044]: x404cP17DnIk0s+sygA/2QtaRZSraKXHVrWgFPcFad25wZ6QdlYVHVqrr6zuaIzj Nov 23 02:58:30 localhost certmonger[39044]: GU4xAGU6sc0YE+1maRMg6VHEuvUAhjwP88pgjdlK39g5v+B/TTU2IHsQfgzKrY00 Nov 23 02:58:30 localhost certmonger[39044]: pcytyBXGapQGG0RCwmyTijh0hb4GpIn68oNgX2nL8iuJm48qs1xIfVdbvtvuGZ5K Nov 23 02:58:30 localhost certmonger[39044]: cw3E4gax4bbyw24oaCPTX4oBeDd+wMSV8mMgqs+35OpuEsG+Jj04N8PVMuVjDWp7 Nov 23 02:58:30 localhost certmonger[39044]: /VtvM+jKMnxf8ibZM1Uklvg2J3nVzwcYA0F2296MKae+iSFbMBiX1fAKrri4YgkH Nov 23 02:58:30 localhost certmonger[39044]: Nz6gOJ2rO9j44aoADA== Nov 23 02:58:30 localhost certmonger[39044]: -----END CERTIFICATE----- Nov 23 02:58:30 localhost certmonger[39044]: ". Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Certificate issued (0 chain certificates, 0 roots). Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] No hooks set for pre-save command. Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost certmonger[39808]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Nov 23 02:58:30 localhost certmonger[39044]: 2025-11-23 07:58:30 [39044] Wrote to /var/lib/certmonger/requests/20251123075829 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 588412e9-f29c-4e50-925a-6d394bc21a8e Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eaceed89-4c58-49f2-8aaf-7397a42b0829 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6209af6e-e43b-4424-ba8c-db0c3b4251bd Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ade1e1a5-91e8-48be-ab86-f5981112f5ec Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost python3[39824]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 86469ff9-f31e-4f32-a4fa-03be99db5384 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l baaeadea-50b0-4404-8884-b8f1c676d367 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9426a345-69c3-4a4f-a021-cfb2e7613604 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:30 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9426a345-69c3-4a4f-a021-cfb2e7613604 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:31 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:32 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:33 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost kernel: VFS: idmapped mount is not enabled. Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1256df-7578-4e45-a61a-9c1730490e6f Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5a76e493-4584-4631-b836-a1b159ecf30b Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dd815616-c99b-4862-b220-7db10ccf9f01 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:34 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 547cddab-f544-422e-a419-c50bc6041c0f Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 137a8077-ec3b-4bca-95b2-43331a67d163 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 455ae718-2b75-4aa9-9a02-3951621c69b9 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 588412e9-f29c-4e50-925a-6d394bc21a8e Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eaceed89-4c58-49f2-8aaf-7397a42b0829 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6209af6e-e43b-4424-ba8c-db0c3b4251bd Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ade1e1a5-91e8-48be-ab86-f5981112f5ec Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 86469ff9-f31e-4f32-a4fa-03be99db5384 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l baaeadea-50b0-4404-8884-b8f1c676d367 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9426a345-69c3-4a4f-a021-cfb2e7613604 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9426a345-69c3-4a4f-a021-cfb2e7613604 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1256df-7578-4e45-a61a-9c1730490e6f Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:35 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:36 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost sedispatch[728]: AVC Message regarding setroubleshoot, ignoring message Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5a76e493-4584-4631-b836-a1b159ecf30b Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dd815616-c99b-4862-b220-7db10ccf9f01 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 547cddab-f544-422e-a419-c50bc6041c0f Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 137a8077-ec3b-4bca-95b2-43331a67d163 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 455ae718-2b75-4aa9-9a02-3951621c69b9 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 588412e9-f29c-4e50-925a-6d394bc21a8e Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eaceed89-4c58-49f2-8aaf-7397a42b0829 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6209af6e-e43b-4424-ba8c-db0c3b4251bd Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ade1e1a5-91e8-48be-ab86-f5981112f5ec Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 86469ff9-f31e-4f32-a4fa-03be99db5384 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l baaeadea-50b0-4404-8884-b8f1c676d367 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9426a345-69c3-4a4f-a021-cfb2e7613604 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9426a345-69c3-4a4f-a021-cfb2e7613604 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:37 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1256df-7578-4e45-a61a-9c1730490e6f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5a76e493-4584-4631-b836-a1b159ecf30b Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dd815616-c99b-4862-b220-7db10ccf9f01 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 170c14ee-32ed-4596-90a8-b2b2b9c5234d Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 547cddab-f544-422e-a419-c50bc6041c0f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 137a8077-ec3b-4bca-95b2-43331a67d163 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 455ae718-2b75-4aa9-9a02-3951621c69b9 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 588412e9-f29c-4e50-925a-6d394bc21a8e Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eaceed89-4c58-49f2-8aaf-7397a42b0829 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6209af6e-e43b-4424-ba8c-db0c3b4251bd Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ade1e1a5-91e8-48be-ab86-f5981112f5ec Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 86469ff9-f31e-4f32-a4fa-03be99db5384 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l baaeadea-50b0-4404-8884-b8f1c676d367 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:38 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1256df-7578-4e45-a61a-9c1730490e6f Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5a76e493-4584-4631-b836-a1b159ecf30b Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dd815616-c99b-4862-b220-7db10ccf9f01 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 170c14ee-32ed-4596-90a8-b2b2b9c5234d Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 547cddab-f544-422e-a419-c50bc6041c0f Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 137a8077-ec3b-4bca-95b2-43331a67d163 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b92eb32f-2cde-494f-8859-ba5be1256e9c Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b49b50b2-c76b-4308-8794-746af98dd79e Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 455ae718-2b75-4aa9-9a02-3951621c69b9 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 18ec6c1e-98c9-4c31-9cc9-3f0a1d99932c Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 588412e9-f29c-4e50-925a-6d394bc21a8e Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eaceed89-4c58-49f2-8aaf-7397a42b0829 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6209af6e-e43b-4424-ba8c-db0c3b4251bd Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 40b2ddc6-7204-4176-afe7-d1d5e5342d5c Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ade1e1a5-91e8-48be-ab86-f5981112f5ec Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d10a111b-af55-4ac2-9bd6-ece695412072 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 86469ff9-f31e-4f32-a4fa-03be99db5384 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23de6786-bbb6-4742-96bc-9b158c12fbbe Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l baaeadea-50b0-4404-8884-b8f1c676d367 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9426a345-69c3-4a4f-a021-cfb2e7613604 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9426a345-69c3-4a4f-a021-cfb2e7613604 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:39 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2d1256df-7578-4e45-a61a-9c1730490e6f Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5a76e493-4584-4631-b836-a1b159ecf30b Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l dd815616-c99b-4862-b220-7db10ccf9f01 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 23717537-f799-46da-8adb-20a858339129 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3d00c76d-5d22-4306-a674-934ae746ca9a Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d932acb9-f8c7-4f75-82c3-e04de30dfaa4 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 170c14ee-32ed-4596-90a8-b2b2b9c5234d Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ac280659-34d2-4fde-8163-56f16c39815f Nov 23 02:58:40 localhost setroubleshoot[39653]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Nov 23 02:58:43 localhost podman[39825]: 2025-11-23 07:58:30.691627193 +0000 UTC m=+0.029976826 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 Nov 23 02:58:43 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Nov 23 02:58:44 localhost python3[39937]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-backup:17.1 cluster.common.tag/cinder-backup:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:58:44 localhost podman[39938]: 2025-11-23 07:58:44.275155887 +0000 UTC m=+0.052409986 image tag 01162f309a727f9f16ef893d348a6167be101f9c31f2a9a381f4a430ffc3b21a cluster.common.tag/cinder-backup:pcmklatest Nov 23 02:58:44 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Nov 23 02:58:44 localhost python3[39964]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:58:49 localhost podman[39965]: 2025-11-23 07:58:44.87409899 +0000 UTC m=+0.043780710 image pull registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 Nov 23 02:58:49 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Nov 23 02:58:49 localhost python3[40032]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-cinder-volume:17.1 cluster.common.tag/cinder-volume:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:58:49 localhost podman[40033]: 2025-11-23 07:58:49.526646949 +0000 UTC m=+0.037047827 image tag ccd22ddeb69c8f3a05d2d3f97d21f9fa64c6f2bc3a156f93212de7feacea314f cluster.common.tag/cinder-volume:pcmklatest Nov 23 02:58:49 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Nov 23 02:58:50 localhost python3[40059]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active rsyslog _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 02:58:50 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Nov 23 02:58:50 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.706s CPU time. Nov 23 02:58:50 localhost systemd[1]: setroubleshootd.service: Deactivated successfully. Nov 23 02:58:50 localhost systemd[1]: setroubleshootd.service: Consumed 17.139s CPU time. Nov 23 02:58:50 localhost python3[40077]: ansible-blockinfile Invoked with content=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 create=True path=/etc/rsyslog.d/openstack-haproxy.conf block=if $syslogfacility-text == 'local0' and $programname == 'haproxy' then -/var/log/containers/haproxy/haproxy.log#012& stop#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 07:58:51 np0005532600 python3[40093]: ansible-ansible.legacy.systemd Invoked with name=rsyslog state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Nov 23 07:58:51 np0005532600 systemd[1]: Stopping System Logging Service... Nov 23 07:58:51 np0005532600 rsyslogd[759]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="759" x-info="https://www.rsyslog.com"] exiting on signal 15. Nov 23 07:58:51 np0005532600 systemd[1]: rsyslog.service: Deactivated successfully. Nov 23 07:58:51 np0005532600 systemd[1]: Stopped System Logging Service. Nov 23 07:58:51 np0005532600 systemd[1]: rsyslog.service: Consumed 1.371s CPU time, read 920.0K from disk, written 3.6M to disk. Nov 23 07:58:51 np0005532600 systemd[1]: Starting System Logging Service... Nov 23 07:58:51 np0005532600 rsyslogd[40096]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="40096" x-info="https://www.rsyslog.com"] start Nov 23 07:58:51 np0005532600 systemd[1]: Started System Logging Service. Nov 23 07:58:51 np0005532600 rsyslogd[40096]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Nov 23 07:58:51 np0005532600 python3[40115]: ansible-ansible.legacy.command Invoked with _raw_params=podman pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 07:58:56 np0005532600 podman[40116]: 2025-11-23 07:58:52.035064947 +0000 UTC m=+0.043270810 image pull registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 Nov 23 07:58:56 np0005532600 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Nov 23 07:58:56 np0005532600 python3[40182]: ansible-ansible.legacy.command Invoked with _raw_params=podman tag registry.redhat.io/rhosp-rhel9/openstack-haproxy:17.1 cluster.common.tag/haproxy:pcmklatest _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 07:58:56 np0005532600 podman[40183]: 2025-11-23 07:58:56.611230394 +0000 UTC m=+0.048812975 image tag bc0fbe6b9534c6b74951010de79a1ae57713cd63ed3f582d78ca1561a7041088 cluster.common.tag/haproxy:pcmklatest Nov 23 07:58:56 np0005532600 systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Nov 23 07:58:57 np0005532600 python3[40209]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 07:59:00 np0005532600 python3[40226]: ansible-systemd Invoked with enabled=True masked=False name=certmonger.service state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None Nov 23 07:59:00 np0005532600 python3[40245]: ansible-file Invoked with path=/etc/pki/tls/certs/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Nov 23 07:59:01 np0005532600 python3[40261]: ansible-file Invoked with path=/etc/pki/tls/private/haproxy serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Nov 23 07:59:01 np0005532600 python3[40277]: ansible-ansible.legacy.command Invoked with _raw_params=set -e#012ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012chmod 0644 ${ca_pem}#012update-ca-trust extract#012test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 07:59:03 np0005532600 python3[40303]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Nov 23 07:59:03 np0005532600 python3[40323]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 07:59:06 np0005532600 python3[40340]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Nov 23 07:59:10 np0005532600 sshd[40615]: main: sshd: ssh-rsa algorithm is disabled Nov 23 07:59:14 np0005532600 python3[40614]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 07:59:14 np0005532600 python3[40632]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Nov 23 07:59:15 np0005532600 python3[40648]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Nov 23 07:59:16 np0005532600 python3[40666]: ansible-certificate_request Invoked with name=haproxy-external-cert dns=['overcloud.ooo.test'] ip=[] principal=['haproxy/overcloud.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=# Copy crt and key for backward compatibility#012cp "/etc/pki/tls/certs/haproxy-external-cert.crt" "/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012cp "/etc/pki/tls/private/haproxy-external-cert.key" "/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012#012ca_type=ipa#012if [ "$ca_type" = "self-sign" ]; then#012 # refresh the ca cert just in case the ca cert has been renewed#012 ca_pem='/etc/pki/ca-trust/source/anchors/cm-local-ca.pem'#012 openssl pkcs12 -in /var/lib/certmonger/local/creds -out ${ca_pem} -nokeys -nodes -passin pass:''#012 chmod 0644 ${ca_pem}#012 update-ca-trust extract#012 test -e ${ca_pem} && openssl x509 -checkend 0 -noout -in ${ca_pem}#012 openssl x509 -in ${ca_pem} -out /tmp/cm-local-ca.pem#012 ca_path="/tmp/cm-local-ca.pem"#012else#012 ca_path="/etc/ipa/ca.crt"#012fi#012#012service_crt="/etc/pki/tls/certs/haproxy/overcloud-haproxy-external.crt"#012service_key="/etc/pki/tls/private/haproxy/overcloud-haproxy-external.key"#012service_pem="/etc/pki/tls/private/overcloud_endpoint.pem"#012#012cat "$service_crt" "$ca_path" "$service_key" > "$service_pem"#012#012container_name=$(podman ps --format=\{\{.Names\}\} | grep -w -E 'haproxy(-bundle-.*-[0-9]+)?')#012# Inject the new pem into the running container#012if echo "$container_name" | grep -q "^haproxy-bundle"; then#012 # lp#1917868: Do not use podman cp with HA containers as they get#012 # frozen temporarily and that can make pacemaker operation fail.#012 tar -c "$service_pem" | podman exec -i "$container_name" tar -C / -xv#012 # no need to update the mount point, because pacemaker#012 # recreates the container when it's restarted#012else#012 # Refresh the pem at the mount-point#012 podman cp $service_pem "$container_name:/var/lib/kolla/config_files/src-tls/$service_pem"#012 # Copy the new pem from the mount-point to the real path#012 podman exec "$container_name" cp "/var/lib/kolla/config_files/src-tls$service_pem" "$service_pem"#012fi#012# Set appropriate permissions#012podman exec "$container_name" chown haproxy:haproxy "$service_pem"#012# Trigger a reload for HAProxy to read the new certificates#012podman kill --signal HUP "$container_name"#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_REQ_SUBJECT" to "CN=overcloud.ooo.test" for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_REQ_HOSTNAME" to "overcloud.ooo.test Nov 23 07:59:16 np0005532600 certmonger[40676]: " for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_REQ_PRINCIPAL" to "haproxy/overcloud.ooo.test@OOO.TEST Nov 23 07:59:16 np0005532600 certmonger[40676]: " for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Nov 23 07:59:16 np0005532600 certmonger[40676]: MIIDmjCCAoICAQAwHTEbMBkGA1UEAxMSb3ZlcmNsb3VkLm9vby50ZXN0MIIBIjAN Nov 23 07:59:16 np0005532600 certmonger[40676]: BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3GYQPWC2cdazIxbvRGa52G+Z8LvW Nov 23 07:59:16 np0005532600 certmonger[40676]: XaAzVXer0Z9G3nDu52GuHQNeRowyDM7ut89EuSNvsiyMPetUvjCwKHSoxM1LWWO6 Nov 23 07:59:16 np0005532600 certmonger[40676]: i6S2SRbzQVSnlfKRj8S+erGBwqi/Ugt8m7E6LmDpYuzX0VGL8ax0l8Hnv7kIL0sR Nov 23 07:59:16 np0005532600 certmonger[40676]: TJ/7ykkNdPZamkRPHVvVlzR84i+PklYD7Uea/cZi3khuD+JSWBHMfG/TmoXf4FCr Nov 23 07:59:16 np0005532600 certmonger[40676]: 9IhavXqu3Fvc78GxRMFh7+VA9fEy85cwvSdk8kkVGjMOobmzBKPER7ERFBuO4ciV Nov 23 07:59:16 np0005532600 certmonger[40676]: A3yMirDrW71Whp5R1SGtjVFNl+7iA/+FQOGX5R54BWF5CvmKVWlaYs4fLQIDAQAB Nov 23 07:59:16 np0005532600 certmonger[40676]: oIIBNjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADUAMQAxADIAMwAwADcANQA5ADEA Nov 23 07:59:16 np0005532600 certmonger[40676]: NjCCAQUGCSqGSIb3DQEJDjGB9zCB9DALBgNVHQ8EBAMCBaAwgZgGA1UdEQSBkDCB Nov 23 07:59:16 np0005532600 certmonger[40676]: jYISb3ZlcmNsb3VkLm9vby50ZXN0oDMGCisGAQQBgjcUAgOgJQwjaGFwcm94eS9v Nov 23 07:59:16 np0005532600 certmonger[40676]: dmVyY2xvdWQub29vLnRlc3RAT09PLlRFU1SgQgYGKwYBBQICoDgwNqAKGwhPT08u Nov 23 07:59:16 np0005532600 certmonger[40676]: VEVTVKEoMCagAwIBAaEfMB0bB2hhcHJveHkbEm92ZXJjbG91ZC5vb28udGVzdDAd Nov 23 07:59:16 np0005532600 certmonger[40676]: BgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNV Nov 23 07:59:16 np0005532600 certmonger[40676]: HQ4EFgQUYpnqjZfJc5IfRxyoMNsrPykPkOcwDQYJKoZIhvcNAQELBQADggEBAEvz Nov 23 07:59:16 np0005532600 certmonger[40676]: Ck996PLZqrRj4znaRP+YNJyi9O8zUNZ6aqKxY6W9R8VogcPKKeZhQJEa9nWEwkC1 Nov 23 07:59:16 np0005532600 certmonger[40676]: p2aPhx2RtLZe9h075RPxIit5ru/PIgohUGbcdO5q0DaYjl3crNvAmbTg2FrIqaca Nov 23 07:59:16 np0005532600 certmonger[40676]: r3bq3d84hGYs96YOSDk4338I3EHzBkdRchUZ3BZispWA/aDPehK5CvE18CvrBTZh Nov 23 07:59:16 np0005532600 certmonger[40676]: 1i4fwx5y/px5dXr1WpTKo9iqPeJR1bsFJZp83Ov/Nzzdf6onAQCgU+jKFgKwKoyh Nov 23 07:59:16 np0005532600 certmonger[40676]: tBCnnjTbCn7Hngz7K6sHxF6F2NGnw4xgPR3eVRbKsbKIlteyjKUP0xgnMhg/j12T Nov 23 07:59:16 np0005532600 certmonger[40676]: 8uUl4YG5KAgdFL8ghD8= Nov 23 07:59:16 np0005532600 certmonger[40676]: -----END CERTIFICATE REQUEST----- Nov 23 07:59:16 np0005532600 certmonger[40676]: " for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_SPKAC" to "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" for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3GYQPWC2cdazIxbvRGa52G+Z8LvWXaAzVXer0Z9G3nDu52GuHQNeRowyDM7ut89EuSNvsiyMPetUvjCwKHSoxM1LWWO6i6S2SRbzQVSnlfKRj8S+erGBwqi/Ugt8m7E6LmDpYuzX0VGL8ax0l8Hnv7kIL0sRTJ/7ykkNdPZamkRPHVvVlzR84i+PklYD7Uea/cZi3khuD+JSWBHMfG/TmoXf4FCr9IhavXqu3Fvc78GxRMFh7+VA9fEy85cwvSdk8kkVGjMOobmzBKPER7ERFBuO4ciVA3yMirDrW71Whp5R1SGtjVFNl+7iA/+FQOGX5R54BWF5CvmKVWlaYs4fLQIDAQAB" for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Nov 23 07:59:16 np0005532600 certmonger[40676]: 2025-11-23 07:59:16 [40676] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[40676]: Submitting request to "https://ipa.ooo.test/ipa/json". Nov 23 07:59:16 np0005532600 ipa-submit[40676]: JSON-RPC error: 2100: Insufficient access: Insufficient 'write' privilege to the 'userCertificate' attribute of entry 'krbprincipalname=haproxy/overcloud.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'. Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Certificate submission still ongoing. Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Certificate submission attempt complete. Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Child status = 2. Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Child output: Nov 23 07:59:16 np0005532600 certmonger[39044]: "Server at https://ipa.ooo.test/ipa/json denied our request, giving up: 2100 (Insufficient access: Insufficient 'write' privilege to the 'userCertificate' attribute of entry 'krbprincipalname=haproxy/overcloud.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'.). Nov 23 07:59:16 np0005532600 certmonger[39044]: " Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Server at https://ipa.ooo.test/ipa/json denied our request, giving up: 2100 (Insufficient access: Insufficient 'write' privilege to the 'userCertificate' attribute of entry 'krbprincipalname=haproxy/overcloud.ooo.test@OOO.TEST,cn=services,cn=accounts,dc=ooo,dc=test'.). Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Certificate not (yet?) issued. Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 07:59:16 np0005532600 certmonger[40678]: Request for certificate to be stored in file "/etc/pki/tls/certs/haproxy-external-cert.crt" rejected by CA. Nov 23 07:59:16 np0005532600 certmonger[39044]: 2025-11-23 07:59:16 [39044] Wrote to /var/lib/certmonger/requests/20251123075916 Nov 23 08:00:27 np0005532600 sshd[40679]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:00:52 np0005532600 sshd[40681]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:01:36 np0005532600 sshd[40694]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:01:46 np0005532600 sshd[40696]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:02:39 np0005532600 sshd[40699]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:03:01 np0005532600 sshd[40702]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:04:07 np0005532600 sshd[40703]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:04:15 np0005532600 sshd[40705]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:04:24 np0005532600 sshd[40707]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:06:05 np0005532600 sshd[40709]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:06:36 np0005532600 sshd[40711]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:06:41 np0005532600 sshd[40713]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:07:47 np0005532600 sshd[40716]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:08:58 np0005532600 sshd[40720]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:09:08 np0005532600 sshd[40723]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:09:08 np0005532600 sshd[40725]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:09:31 np0005532600 sshd[40727]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:09:41 np0005532600 sshd[40729]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:10:25 np0005532600 sshd[40733]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:11:08 np0005532600 sshd[40735]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:11:24 np0005532600 sshd[40737]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:11:32 np0005532600 sshd[40739]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:12:48 np0005532600 sshd[40743]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:13:22 np0005532600 sshd[40746]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:13:56 np0005532600 sshd[40750]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:14:19 np0005532600 sshd[40752]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:14:19 np0005532600 sshd[40753]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:14:31 np0005532600 sshd[40754]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:14:49 np0005532600 sshd[40756]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:16:13 np0005532600 sshd[40758]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:16:16 np0005532600 sshd[40760]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:16:18 np0005532600 sshd[40763]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:16:24 np0005532600 sshd[40766]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:17:38 np0005532600 sshd[40768]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:17:59 np0005532600 sshd[40770]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:18:38 np0005532600 sshd[40772]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:18:48 np0005532600 sshd[40775]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:18:59 np0005532600 sshd[40777]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:19:11 np0005532600 sshd[40780]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:19:39 np0005532600 sshd[40781]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:20:18 np0005532600 sshd[40784]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:20:42 np0005532600 sshd[40787]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:21:01 np0005532600 systemd[1]: session-14.scope: Deactivated successfully. Nov 23 08:21:01 np0005532600 systemd[1]: session-14.scope: Consumed 3.064s CPU time. Nov 23 08:21:01 np0005532600 systemd-logind[36493]: Session 14 logged out. Waiting for processes to exit. Nov 23 08:21:01 np0005532600 systemd-logind[36493]: Removed session 14. Nov 23 08:21:06 np0005532600 sshd[40791]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:21:12 np0005532600 systemd[1]: Stopping User Manager for UID 1000... Nov 23 08:21:12 np0005532600 systemd[4178]: Activating special unit Exit the Session... Nov 23 08:21:12 np0005532600 systemd[4178]: Stopping podman-pause-8633442a.scope... Nov 23 08:21:12 np0005532600 systemd[4178]: Removed slice User Background Tasks Slice. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped target Main User Target. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped target Basic System. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped target Paths. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped target Sockets. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped target Timers. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped Mark boot as successful after the user session has run 2 minutes. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped Daily Cleanup of User's Temporary Directories. Nov 23 08:21:12 np0005532600 dbus-broker[18416]: Dispatched 366 messages @ 8(±57)μs / message. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopping D-Bus User Message Bus... Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped Create User's Volatile Files and Directories. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped podman-pause-8633442a.scope. Nov 23 08:21:12 np0005532600 systemd[4178]: Removed slice Slice /user. Nov 23 08:21:12 np0005532600 systemd[4178]: Stopped D-Bus User Message Bus. Nov 23 08:21:12 np0005532600 systemd[4178]: Closed D-Bus User Message Bus Socket. Nov 23 08:21:12 np0005532600 systemd[4178]: Removed slice User Application Slice. Nov 23 08:21:12 np0005532600 systemd[4178]: Reached target Shutdown. Nov 23 08:21:12 np0005532600 systemd[4178]: Finished Exit the Session. Nov 23 08:21:12 np0005532600 systemd[4178]: Reached target Exit the Session. Nov 23 08:21:12 np0005532600 systemd[1]: user@1000.service: Deactivated successfully. Nov 23 08:21:12 np0005532600 systemd[1]: Stopped User Manager for UID 1000. Nov 23 08:21:12 np0005532600 sshd[40794]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:21:13 np0005532600 sshd[40796]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:21:22 np0005532600 sshd[40798]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:21:41 np0005532600 sshd[40801]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:23:01 np0005532600 sshd[40803]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:23:05 np0005532600 sshd[40806]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:23:07 np0005532600 sshd[40809]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:23:32 np0005532600 sshd[40812]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:23:38 np0005532600 sshd[40814]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:24:21 np0005532600 sshd[40817]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:24:42 np0005532600 sshd[40822]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:24:54 np0005532600 sshd[40824]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:25:39 np0005532600 sshd[40826]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:26:00 np0005532600 sshd[40829]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:26:04 np0005532600 sshd[40832]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:26:22 np0005532600 sshd[40833]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:26:23 np0005532600 krb5_child[40837]: Preauthentication failed Nov 23 08:26:23 np0005532600 krb5_child[40837]: Preauthentication failed Nov 23 08:26:39 np0005532600 sshd[40838]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:27:02 np0005532600 sshd[40840]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:28:25 np0005532600 sshd[40844]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:28:26 np0005532600 sshd[40846]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:28:29 np0005532600 sshd[40848]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:28:30 np0005532600 sshd[40851]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:28:30 np0005532600 krb5_child[40854]: Preauthentication failed Nov 23 08:28:30 np0005532600 krb5_child[40854]: Preauthentication failed Nov 23 08:29:17 np0005532600 systemd[1]: session-15.scope: Deactivated successfully. Nov 23 08:29:17 np0005532600 systemd[1]: session-15.scope: Consumed 4min 28.720s CPU time. Nov 23 08:29:17 np0005532600 systemd-logind[36493]: Session 15 logged out. Waiting for processes to exit. Nov 23 08:29:17 np0005532600 systemd-logind[36493]: Removed session 15. Nov 23 08:29:27 np0005532600 systemd[1]: Stopping User Manager for UID 1002... Nov 23 08:29:27 np0005532600 systemd[26438]: Activating special unit Exit the Session... Nov 23 08:29:27 np0005532600 systemd[26438]: Removed slice User Background Tasks Slice. Nov 23 08:29:27 np0005532600 systemd[26438]: Stopped target Main User Target. Nov 23 08:29:27 np0005532600 systemd[26438]: Stopped target Basic System. Nov 23 08:29:27 np0005532600 systemd[26438]: Stopped target Paths. Nov 23 08:29:27 np0005532600 systemd[26438]: Stopped target Sockets. Nov 23 08:29:27 np0005532600 systemd[26438]: Stopped target Timers. Nov 23 08:29:27 np0005532600 systemd[26438]: Stopped Mark boot as successful after the user session has run 2 minutes. Nov 23 08:29:27 np0005532600 systemd[26438]: Stopped Daily Cleanup of User's Temporary Directories. Nov 23 08:29:27 np0005532600 systemd[26438]: Closed D-Bus User Message Bus Socket. Nov 23 08:29:27 np0005532600 systemd[26438]: Stopped Create User's Volatile Files and Directories. Nov 23 08:29:27 np0005532600 systemd[26438]: Removed slice User Application Slice. Nov 23 08:29:27 np0005532600 systemd[26438]: Reached target Shutdown. Nov 23 08:29:27 np0005532600 systemd[26438]: Finished Exit the Session. Nov 23 08:29:27 np0005532600 systemd[26438]: Reached target Exit the Session. Nov 23 08:29:27 np0005532600 systemd[1]: user@1002.service: Deactivated successfully. Nov 23 08:29:27 np0005532600 systemd[1]: Stopped User Manager for UID 1002. Nov 23 08:29:27 np0005532600 systemd[1]: Stopping User Runtime Directory /run/user/1002... Nov 23 08:29:27 np0005532600 systemd[1]: run-user-1002.mount: Deactivated successfully. Nov 23 08:29:27 np0005532600 systemd[1]: user-runtime-dir@1002.service: Deactivated successfully. Nov 23 08:29:27 np0005532600 systemd[1]: Stopped User Runtime Directory /run/user/1002. Nov 23 08:29:27 np0005532600 systemd[1]: Removed slice User Slice of UID 1002. Nov 23 08:29:27 np0005532600 systemd[1]: user-1002.slice: Consumed 4min 29.031s CPU time. Nov 23 08:29:53 np0005532600 sshd[40860]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:30:19 np0005532600 sshd[40866]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:30:48 np0005532600 sshd[40868]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:30:53 np0005532600 sshd[40870]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:31:15 np0005532600 sshd[40872]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:31:47 np0005532600 sshd[40874]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:32:07 np0005532600 sshd[40877]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:32:36 np0005532600 sshd[40879]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:33:15 np0005532600 sshd[40881]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:33:22 np0005532600 sshd[40883]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:33:58 np0005532600 sshd[40884]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:34:02 np0005532600 sshd[40887]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:35:20 np0005532600 sshd[40890]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:35:41 np0005532600 sshd[40893]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:35:44 np0005532600 sshd[40894]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:36:01 np0005532600 sshd[40897]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:36:42 np0005532600 sshd[40899]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:37:53 np0005532600 sshd[40902]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:38:01 np0005532600 sshd[40904]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:38:05 np0005532600 sshd[40907]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:38:10 np0005532600 sshd[40910]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:39:23 np0005532600 sshd[40913]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:39:50 np0005532600 sshd[40916]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:40:38 np0005532600 sshd[40919]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:40:46 np0005532600 sshd[40921]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:41:45 np0005532600 sshd[40925]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:42:10 np0005532600 sshd[40927]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:42:58 np0005532600 sshd[40931]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:43:04 np0005532600 sshd[40934]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:43:28 np0005532600 sshd[40935]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:43:33 np0005532600 sshd[40937]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:43:36 np0005532600 sshd[40940]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:44:55 np0005532600 sshd[40942]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:45:24 np0005532600 sshd[40944]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:45:29 np0005532600 sshd[40947]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:45:31 np0005532600 sshd[40949]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:46:13 np0005532600 sshd[40951]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:46:20 np0005532600 sshd[40953]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:47:28 np0005532600 sshd[40957]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:47:42 np0005532600 sshd[40960]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:47:52 np0005532600 sshd[40962]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:47:57 np0005532600 sshd[40964]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:48:48 np0005532600 sshd[40966]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:49:01 np0005532600 sshd[40968]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:49:23 np0005532600 sshd[40971]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:49:36 np0005532600 sshd[40973]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:50:20 np0005532600 sshd[40975]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:50:23 np0005532600 sshd[40978]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:50:27 np0005532600 sshd[40979]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:50:46 np0005532600 sshd[40980]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:51:18 np0005532600 sshd[40984]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:51:20 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=50607 DF PROTO=TCP SPT=16414 DPT=9090 SEQ=224606546 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE957CEF9000000000103030A) Nov 23 08:51:21 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=50608 DF PROTO=TCP SPT=16414 DPT=9090 SEQ=224606546 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE957D30D000000000103030A) Nov 23 08:51:23 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=50609 DF PROTO=TCP SPT=16414 DPT=9090 SEQ=224606546 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE957DB0E000000000103030A) Nov 23 08:51:27 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=50610 DF PROTO=TCP SPT=16414 DPT=9090 SEQ=224606546 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE957EACD000000000103030A) Nov 23 08:51:35 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=24029 DF PROTO=TCP SPT=29702 DPT=9090 SEQ=2681173954 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE95809A8000000000103030A) Nov 23 08:51:36 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=24030 DF PROTO=TCP SPT=29702 DPT=9090 SEQ=2681173954 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE9580DCE000000000103030A) Nov 23 08:51:38 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=24031 DF PROTO=TCP SPT=29702 DPT=9090 SEQ=2681173954 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE95815CD000000000103030A) Nov 23 08:51:40 np0005532600 sshd[40986]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:51:42 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=24032 DF PROTO=TCP SPT=29702 DPT=9090 SEQ=2681173954 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE958258E000000000103030A) Nov 23 08:51:45 np0005532600 sshd[40988]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:51:54 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=63571 DF PROTO=TCP SPT=23774 DPT=9090 SEQ=3806321121 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE958539B000000000103030A) Nov 23 08:51:55 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=63572 DF PROTO=TCP SPT=23774 DPT=9090 SEQ=3806321121 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE958578E000000000103030A) Nov 23 08:51:57 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=63573 DF PROTO=TCP SPT=23774 DPT=9090 SEQ=3806321121 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE9585F8D000000000103030A) Nov 23 08:52:01 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=63574 DF PROTO=TCP SPT=23774 DPT=9090 SEQ=3806321121 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE9586F4E000000000103030A) Nov 23 08:52:01 np0005532600 sshd[40991]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:52:02 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=46716 DF PROTO=TCP SPT=22490 DPT=9090 SEQ=4185952101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A36606665000000000103030A) Nov 23 08:52:03 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=46717 DF PROTO=TCP SPT=22490 DPT=9090 SEQ=4185952101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A36606A5F000000000103030A) Nov 23 08:52:05 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=46718 DF PROTO=TCP SPT=22490 DPT=9090 SEQ=4185952101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3660725F000000000103030A) Nov 23 08:52:09 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=46719 DF PROTO=TCP SPT=22490 DPT=9090 SEQ=4185952101 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3660821F000000000103030A) Nov 23 08:52:09 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=51333 DF PROTO=TCP SPT=23492 DPT=9090 SEQ=4235242381 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE9588F7A000000000103030A) Nov 23 08:52:10 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=51334 DF PROTO=TCP SPT=23492 DPT=9090 SEQ=4235242381 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE958938D000000000103030A) Nov 23 08:52:12 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=51335 DF PROTO=TCP SPT=23492 DPT=9090 SEQ=4235242381 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE9589B8D000000000103030A) Nov 23 08:52:16 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=64769 DF PROTO=TCP SPT=63924 DPT=9090 SEQ=1252533946 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A36609D86000000000103030A) Nov 23 08:52:16 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=167.94.138.180 DST=38.102.83.164 LEN=60 TOS=0x08 PREC=0x40 TTL=52 ID=51336 DF PROTO=TCP SPT=23492 DPT=9090 SEQ=4235242381 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080AE958AB4E000000000103030A) Nov 23 08:52:17 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=64770 DF PROTO=TCP SPT=63924 DPT=9090 SEQ=1252533946 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3660A19E000000000103030A) Nov 23 08:52:19 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=64771 DF PROTO=TCP SPT=63924 DPT=9090 SEQ=1252533946 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3660A99F000000000103030A) Nov 23 08:52:23 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=64772 DF PROTO=TCP SPT=63924 DPT=9090 SEQ=1252533946 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3660B960000000000103030A) Nov 23 08:52:36 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=10703 DF PROTO=TCP SPT=61834 DPT=9090 SEQ=2838456935 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3660EC6F000000000103030A) Nov 23 08:52:37 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=10704 DF PROTO=TCP SPT=61834 DPT=9090 SEQ=2838456935 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3660F05F000000000103030A) Nov 23 08:52:39 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=58042 DF PROTO=TCP SPT=34456 DPT=9090 SEQ=319434226 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A9474E965000000000103030A) Nov 23 08:52:39 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=10705 DF PROTO=TCP SPT=61834 DPT=9090 SEQ=2838456935 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3660F85F000000000103030A) Nov 23 08:52:40 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=58043 DF PROTO=TCP SPT=34456 DPT=9090 SEQ=319434226 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A9474ED6A000000000103030A) Nov 23 08:52:42 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=58044 DF PROTO=TCP SPT=34456 DPT=9090 SEQ=319434226 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A9474F569000000000103030A) Nov 23 08:52:43 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=10706 DF PROTO=TCP SPT=61834 DPT=9090 SEQ=2838456935 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A36610820000000000103030A) Nov 23 08:52:46 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=58045 DF PROTO=TCP SPT=34456 DPT=9090 SEQ=319434226 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A94750529000000000103030A) Nov 23 08:52:47 np0005532600 sshd[40993]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:52:51 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=45950 DF PROTO=TCP SPT=6098 DPT=9090 SEQ=1523929687 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3661271C000000000103030A) Nov 23 08:52:52 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=45951 DF PROTO=TCP SPT=6098 DPT=9090 SEQ=1523929687 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A36612B1E000000000103030A) Nov 23 08:52:54 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=34203 DF PROTO=TCP SPT=21152 DPT=9090 SEQ=4058007046 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A9475240F000000000103030A) Nov 23 08:52:54 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=45952 DF PROTO=TCP SPT=6098 DPT=9090 SEQ=1523929687 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A3661331E000000000103030A) Nov 23 08:52:55 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=34204 DF PROTO=TCP SPT=21152 DPT=9090 SEQ=4058007046 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A94752828000000000103030A) Nov 23 08:52:57 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=34205 DF PROTO=TCP SPT=21152 DPT=9090 SEQ=4058007046 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A94753028000000000103030A) Nov 23 08:52:58 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=162.142.125.197 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=45953 DF PROTO=TCP SPT=6098 DPT=9090 SEQ=1523929687 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A366142DF000000000103030A) Nov 23 08:53:01 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=34206 DF PROTO=TCP SPT=21152 DPT=9090 SEQ=4058007046 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A94753FE9000000000103030A) Nov 23 08:53:03 np0005532600 sshd[40995]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:53:17 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=35735 DF PROTO=TCP SPT=29886 DPT=9090 SEQ=2043856718 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A94757C2D000000000103030A) Nov 23 08:53:18 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=35736 DF PROTO=TCP SPT=29886 DPT=9090 SEQ=2043856718 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A94758028000000000103030A) Nov 23 08:53:19 np0005532600 sshd[40998]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:53:20 np0005532600 sshd[41000]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:53:20 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=35737 DF PROTO=TCP SPT=29886 DPT=9090 SEQ=2043856718 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A94758828000000000103030A) Nov 23 08:53:24 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=35738 DF PROTO=TCP SPT=29886 DPT=9090 SEQ=2043856718 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A947597E9000000000103030A) Nov 23 08:53:32 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=54769 DF PROTO=TCP SPT=34316 DPT=9090 SEQ=1498102901 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A9475B6FA000000000103030A) Nov 23 08:53:33 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=54770 DF PROTO=TCP SPT=34316 DPT=9090 SEQ=1498102901 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A9475BAE8000000000103030A) Nov 23 08:53:35 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=54771 DF PROTO=TCP SPT=34316 DPT=9090 SEQ=1498102901 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A9475C2E8000000000103030A) Nov 23 08:53:39 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=66.132.153.112 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=54772 DF PROTO=TCP SPT=34316 DPT=9090 SEQ=1498102901 ACK=0 WINDOW=21900 RES=0x00 SYN URGP=0 OPT (020405B40402080A9475D2A9000000000103030A) Nov 23 08:54:23 np0005532600 sshd[41002]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:54:36 np0005532600 sshd[41004]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:55:11 np0005532600 sshd[41008]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:55:18 np0005532600 sshd[41011]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:55:43 np0005532600 sshd[41013]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:55:58 np0005532600 sshd[41015]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:56:33 np0005532600 sshd[41018]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:57:03 np0005532600 sshd[41020]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:57:11 np0005532600 sshd[41023]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:57:18 np0005532600 sshd[41026]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:58:30 np0005532600 sshd[41030]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:58:31 np0005532600 systemd[1]: Starting dnf makecache... Nov 23 08:58:31 np0005532600 dnf[41032]: Updating Subscription Management repositories. Nov 23 08:58:33 np0005532600 dnf[41032]: Metadata cache refreshed recently. Nov 23 08:58:33 np0005532600 systemd[1]: dnf-makecache.service: Deactivated successfully. Nov 23 08:58:33 np0005532600 systemd[1]: Finished dnf makecache. Nov 23 08:58:33 np0005532600 systemd[1]: dnf-makecache.service: Consumed 1.935s CPU time. Nov 23 08:58:42 np0005532600 sshd[41034]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:59:07 np0005532600 sshd[41037]: main: sshd: ssh-rsa algorithm is disabled Nov 23 08:59:54 np0005532600 sshd[41039]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:00:07 np0005532600 sshd[41042]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:01:05 np0005532600 sshd[41055]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:01:06 np0005532600 sshd[41057]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:01:31 np0005532600 sshd[41059]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:02:02 np0005532600 sshd[41061]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:02:10 np0005532600 sshd[41063]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:02:54 np0005532600 sshd[41065]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:02:58 np0005532600 sshd[41067]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:03:16 np0005532600 sshd[41069]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:03:48 np0005532600 sshd[41072]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:04:07 np0005532600 sshd[41073]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:04:19 np0005532600 sshd[41074]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:04:53 np0005532600 sshd[41076]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:05:16 np0005532600 sshd[41079]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:05:26 np0005532600 sshd[41081]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:05:32 np0005532600 sshd[41084]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:05:46 np0005532600 sshd[41086]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:06:19 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=363 DF PROTO=TCP SPT=34652 DPT=19885 SEQ=4016942537 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A919E18490000000001030307) Nov 23 09:06:20 np0005532600 sshd[41089]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:06:20 np0005532600 systemd[1]: Starting User Manager for UID 1000... Nov 23 09:06:20 np0005532600 systemd-logind[36493]: New session 17 of user zuul. Nov 23 09:06:20 np0005532600 systemd[41093]: Queued start job for default target Main User Target. Nov 23 09:06:20 np0005532600 systemd[41093]: Created slice User Application Slice. Nov 23 09:06:20 np0005532600 systemd[41093]: Started Mark boot as successful after the user session has run 2 minutes. Nov 23 09:06:20 np0005532600 systemd[41093]: Started Daily Cleanup of User's Temporary Directories. Nov 23 09:06:20 np0005532600 systemd[41093]: Reached target Paths. Nov 23 09:06:20 np0005532600 systemd[41093]: Reached target Timers. Nov 23 09:06:20 np0005532600 systemd[41093]: Starting D-Bus User Message Bus Socket... Nov 23 09:06:20 np0005532600 systemd[41093]: Starting Create User's Volatile Files and Directories... Nov 23 09:06:20 np0005532600 systemd[41093]: Listening on D-Bus User Message Bus Socket. Nov 23 09:06:20 np0005532600 systemd[41093]: Reached target Sockets. Nov 23 09:06:20 np0005532600 systemd[41093]: Finished Create User's Volatile Files and Directories. Nov 23 09:06:20 np0005532600 systemd[41093]: Reached target Basic System. Nov 23 09:06:20 np0005532600 systemd[41093]: Reached target Main User Target. Nov 23 09:06:20 np0005532600 systemd[41093]: Startup finished in 112ms. Nov 23 09:06:20 np0005532600 systemd[1]: Started User Manager for UID 1000. Nov 23 09:06:20 np0005532600 systemd[1]: Started Session 17 of User zuul. Nov 23 09:06:20 np0005532600 python3[41124]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-d3b7-3f50-00000000000c-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Nov 23 09:06:20 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=364 DF PROTO=TCP SPT=34652 DPT=19885 SEQ=4016942537 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A919E1C540000000001030307) Nov 23 09:06:21 np0005532600 subscription-manager[41125]: Unregistered machine with identity: 088759a5-187c-45d2-8f56-63060592b84b Nov 23 09:06:23 np0005532600 kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:ca:f3:e3 MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.164 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=365 DF PROTO=TCP SPT=34652 DPT=19885 SEQ=4016942537 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A919E24540000000001030307) Nov 23 09:06:26 np0005532600 systemd[1]: session-17.scope: Deactivated successfully. Nov 23 09:06:26 np0005532600 systemd-logind[36493]: Session 17 logged out. Waiting for processes to exit. Nov 23 09:06:26 np0005532600 systemd-logind[36493]: Removed session 17. Nov 23 09:06:36 np0005532600 systemd[1]: Stopping User Manager for UID 1000... Nov 23 09:06:36 np0005532600 systemd[41093]: Activating special unit Exit the Session... Nov 23 09:06:36 np0005532600 systemd[41093]: Stopped target Main User Target. Nov 23 09:06:36 np0005532600 systemd[41093]: Stopped target Basic System. Nov 23 09:06:36 np0005532600 systemd[41093]: Stopped target Paths. Nov 23 09:06:36 np0005532600 systemd[41093]: Stopped target Sockets. Nov 23 09:06:36 np0005532600 systemd[41093]: Stopped target Timers. Nov 23 09:06:36 np0005532600 systemd[41093]: Stopped Mark boot as successful after the user session has run 2 minutes. Nov 23 09:06:36 np0005532600 systemd[41093]: Stopped Daily Cleanup of User's Temporary Directories. Nov 23 09:06:36 np0005532600 systemd[41093]: Closed D-Bus User Message Bus Socket. Nov 23 09:06:36 np0005532600 systemd[41093]: Stopped Create User's Volatile Files and Directories. Nov 23 09:06:36 np0005532600 systemd[41093]: Removed slice User Application Slice. Nov 23 09:06:36 np0005532600 systemd[41093]: Reached target Shutdown. Nov 23 09:06:36 np0005532600 systemd[41093]: Finished Exit the Session. Nov 23 09:06:36 np0005532600 systemd[41093]: Reached target Exit the Session. Nov 23 09:06:36 np0005532600 systemd[1]: user@1000.service: Deactivated successfully. Nov 23 09:06:36 np0005532600 systemd[1]: Stopped User Manager for UID 1000. Nov 23 09:06:37 np0005532600 sshd[41127]: main: sshd: ssh-rsa algorithm is disabled Nov 23 09:06:37 np0005532600 systemd[1]: Starting User Manager for UID 1000... Nov 23 09:06:37 np0005532600 systemd-logind[36493]: New session 19 of user zuul. Nov 23 09:06:37 np0005532600 systemd[41131]: Queued start job for default target Main User Target. Nov 23 09:06:37 np0005532600 systemd[41131]: Created slice User Application Slice. Nov 23 09:06:37 np0005532600 systemd[41131]: Started Mark boot as successful after the user session has run 2 minutes. Nov 23 09:06:37 np0005532600 systemd[41131]: Started Daily Cleanup of User's Temporary Directories. Nov 23 09:06:37 np0005532600 systemd[41131]: Reached target Paths. Nov 23 09:06:37 np0005532600 systemd[41131]: Reached target Timers.