Jan 23 01:45:06 localhost kernel: Linux version 5.14.0-284.11.1.el9_2.x86_64 (mockbuild@x86-vm-09.build.eng.bos.redhat.com) (gcc (GCC) 11.3.1 20221121 (Red Hat 11.3.1-4), GNU ld version 2.35.2-37.el9) #1 SMP PREEMPT_DYNAMIC Wed Apr 12 10:45:03 EDT 2023 Jan 23 01:45:06 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Jan 23 01:45:06 localhost kernel: Command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:06 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 23 01:45:06 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 23 01:45:06 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 23 01:45:06 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 23 01:45:06 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jan 23 01:45:06 localhost kernel: signal: max sigframe size: 1776 Jan 23 01:45:06 localhost kernel: BIOS-provided physical RAM map: Jan 23 01:45:06 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 23 01:45:06 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 23 01:45:06 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 23 01:45:06 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Jan 23 01:45:06 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Jan 23 01:45:06 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 23 01:45:06 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 23 01:45:06 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000043fffffff] usable Jan 23 01:45:06 localhost kernel: NX (Execute Disable) protection: active Jan 23 01:45:06 localhost kernel: SMBIOS 2.8 present. Jan 23 01:45:06 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Jan 23 01:45:06 localhost kernel: Hypervisor detected: KVM Jan 23 01:45:06 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 23 01:45:06 localhost kernel: kvm-clock: using sched offset of 1859687635 cycles Jan 23 01:45:06 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 23 01:45:06 localhost kernel: tsc: Detected 2799.998 MHz processor Jan 23 01:45:06 localhost kernel: last_pfn = 0x440000 max_arch_pfn = 0x400000000 Jan 23 01:45:06 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 23 01:45:06 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Jan 23 01:45:06 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Jan 23 01:45:06 localhost kernel: Using GB pages for direct mapping Jan 23 01:45:06 localhost kernel: RAMDISK: [mem 0x2eef4000-0x33771fff] Jan 23 01:45:06 localhost kernel: ACPI: Early table checksum verification disabled Jan 23 01:45:06 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Jan 23 01:45:06 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:06 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:06 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:06 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Jan 23 01:45:06 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:06 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 23 01:45:06 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Jan 23 01:45:06 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Jan 23 01:45:06 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Jan 23 01:45:06 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Jan 23 01:45:06 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Jan 23 01:45:06 localhost kernel: No NUMA configuration found Jan 23 01:45:06 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000043fffffff] Jan 23 01:45:06 localhost kernel: NODE_DATA(0) allocated [mem 0x43ffd5000-0x43fffffff] Jan 23 01:45:06 localhost kernel: Reserving 256MB of memory at 2800MB for crashkernel (System RAM: 16383MB) Jan 23 01:45:06 localhost kernel: Zone ranges: Jan 23 01:45:06 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 23 01:45:06 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jan 23 01:45:06 localhost kernel: Normal [mem 0x0000000100000000-0x000000043fffffff] Jan 23 01:45:06 localhost kernel: Device empty Jan 23 01:45:06 localhost kernel: Movable zone start for each node Jan 23 01:45:06 localhost kernel: Early memory node ranges Jan 23 01:45:06 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 23 01:45:06 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Jan 23 01:45:06 localhost kernel: node 0: [mem 0x0000000100000000-0x000000043fffffff] Jan 23 01:45:06 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000043fffffff] Jan 23 01:45:06 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 23 01:45:06 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 23 01:45:06 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Jan 23 01:45:06 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Jan 23 01:45:06 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 23 01:45:06 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 23 01:45:06 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 23 01:45:06 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 23 01:45:06 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 23 01:45:06 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 23 01:45:06 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 23 01:45:06 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jan 23 01:45:06 localhost kernel: TSC deadline timer available Jan 23 01:45:06 localhost kernel: smpboot: Allowing 8 CPUs, 0 hotplug CPUs Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Jan 23 01:45:06 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Jan 23 01:45:06 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Jan 23 01:45:06 localhost kernel: Booting paravirtualized kernel on KVM Jan 23 01:45:06 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 23 01:45:06 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Jan 23 01:45:06 localhost kernel: percpu: Embedded 55 pages/cpu s188416 r8192 d28672 u262144 Jan 23 01:45:06 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Jan 23 01:45:06 localhost kernel: Fallback order for Node 0: 0 Jan 23 01:45:06 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 4128475 Jan 23 01:45:06 localhost kernel: Policy zone: Normal Jan 23 01:45:06 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:06 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64", will be passed to user space. Jan 23 01:45:06 localhost kernel: Dentry cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Jan 23 01:45:06 localhost kernel: Inode-cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Jan 23 01:45:06 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 23 01:45:06 localhost kernel: software IO TLB: area num 8. Jan 23 01:45:06 localhost kernel: Memory: 2873456K/16776676K available (14342K kernel code, 5536K rwdata, 10180K rodata, 2792K init, 7524K bss, 741260K reserved, 0K cma-reserved) Jan 23 01:45:06 localhost kernel: random: get_random_u64 called from kmem_cache_open+0x1e/0x210 with crng_init=0 Jan 23 01:45:06 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Jan 23 01:45:06 localhost kernel: ftrace: allocating 44803 entries in 176 pages Jan 23 01:45:06 localhost kernel: ftrace: allocated 176 pages with 3 groups Jan 23 01:45:06 localhost kernel: Dynamic Preempt: voluntary Jan 23 01:45:06 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Jan 23 01:45:06 localhost kernel: rcu: #011RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Jan 23 01:45:06 localhost kernel: #011Trampoline variant of Tasks RCU enabled. Jan 23 01:45:06 localhost kernel: #011Rude variant of Tasks RCU enabled. Jan 23 01:45:06 localhost kernel: #011Tracing variant of Tasks RCU enabled. Jan 23 01:45:06 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 23 01:45:06 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Jan 23 01:45:06 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Jan 23 01:45:06 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Jan 23 01:45:06 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Jan 23 01:45:06 localhost kernel: random: crng init done (trusting CPU's manufacturer) Jan 23 01:45:06 localhost kernel: Console: colour VGA+ 80x25 Jan 23 01:45:06 localhost kernel: printk: console [tty0] enabled Jan 23 01:45:06 localhost kernel: printk: console [ttyS0] enabled Jan 23 01:45:06 localhost kernel: ACPI: Core revision 20211217 Jan 23 01:45:06 localhost kernel: APIC: Switch to symmetric I/O mode setup Jan 23 01:45:06 localhost kernel: x2apic enabled Jan 23 01:45:06 localhost kernel: Switched APIC routing to physical x2apic. Jan 23 01:45:06 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 23 01:45:06 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Jan 23 01:45:06 localhost kernel: pid_max: default: 32768 minimum: 301 Jan 23 01:45:06 localhost kernel: LSM: Security Framework initializing Jan 23 01:45:06 localhost kernel: Yama: becoming mindful. Jan 23 01:45:06 localhost kernel: SELinux: Initializing. Jan 23 01:45:06 localhost kernel: LSM support for eBPF active Jan 23 01:45:06 localhost kernel: Mount-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 23 01:45:06 localhost kernel: Mountpoint-cache hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 23 01:45:06 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 23 01:45:06 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 23 01:45:06 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 23 01:45:06 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 23 01:45:06 localhost kernel: Spectre V2 : Mitigation: Retpolines Jan 23 01:45:06 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 23 01:45:06 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Jan 23 01:45:06 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jan 23 01:45:06 localhost kernel: RETBleed: Mitigation: untrained return thunk Jan 23 01:45:06 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jan 23 01:45:06 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Jan 23 01:45:06 localhost kernel: Freeing SMP alternatives memory: 36K Jan 23 01:45:06 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Jan 23 01:45:06 localhost kernel: cblist_init_generic: Setting adjustable number of callback queues. Jan 23 01:45:06 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:06 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:06 localhost kernel: cblist_init_generic: Setting shift to 3 and lim to 1. Jan 23 01:45:06 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jan 23 01:45:06 localhost kernel: ... version: 0 Jan 23 01:45:06 localhost kernel: ... bit width: 48 Jan 23 01:45:06 localhost kernel: ... generic registers: 6 Jan 23 01:45:06 localhost kernel: ... value mask: 0000ffffffffffff Jan 23 01:45:06 localhost kernel: ... max period: 00007fffffffffff Jan 23 01:45:06 localhost kernel: ... fixed-purpose events: 0 Jan 23 01:45:06 localhost kernel: ... event mask: 000000000000003f Jan 23 01:45:06 localhost kernel: rcu: Hierarchical SRCU implementation. Jan 23 01:45:06 localhost kernel: rcu: #011Max phase no-delay instances is 400. Jan 23 01:45:06 localhost kernel: smp: Bringing up secondary CPUs ... Jan 23 01:45:06 localhost kernel: x86: Booting SMP configuration: Jan 23 01:45:06 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Jan 23 01:45:06 localhost kernel: smp: Brought up 1 node, 8 CPUs Jan 23 01:45:06 localhost kernel: smpboot: Max logical packages: 8 Jan 23 01:45:06 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Jan 23 01:45:06 localhost kernel: node 0 deferred pages initialised in 28ms Jan 23 01:45:06 localhost kernel: devtmpfs: initialized Jan 23 01:45:06 localhost kernel: x86/mm: Memory block size: 128MB Jan 23 01:45:06 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 23 01:45:06 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Jan 23 01:45:06 localhost kernel: pinctrl core: initialized pinctrl subsystem Jan 23 01:45:06 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jan 23 01:45:06 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL pool for atomic allocations Jan 23 01:45:06 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jan 23 01:45:06 localhost kernel: DMA: preallocated 2048 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jan 23 01:45:06 localhost kernel: audit: initializing netlink subsys (disabled) Jan 23 01:45:06 localhost kernel: audit: type=2000 audit(1769150705.104:1): state=initialized audit_enabled=0 res=1 Jan 23 01:45:06 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Jan 23 01:45:06 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 23 01:45:06 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Jan 23 01:45:06 localhost kernel: cpuidle: using governor menu Jan 23 01:45:06 localhost kernel: HugeTLB: can optimize 4095 vmemmap pages for hugepages-1048576kB Jan 23 01:45:06 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 23 01:45:06 localhost kernel: PCI: Using configuration type 1 for base access Jan 23 01:45:06 localhost kernel: PCI: Using configuration type 1 for extended access Jan 23 01:45:06 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jan 23 01:45:06 localhost kernel: HugeTLB: can optimize 7 vmemmap pages for hugepages-2048kB Jan 23 01:45:06 localhost kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jan 23 01:45:06 localhost kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jan 23 01:45:06 localhost kernel: cryptd: max_cpu_qlen set to 1000 Jan 23 01:45:06 localhost kernel: ACPI: Added _OSI(Module Device) Jan 23 01:45:06 localhost kernel: ACPI: Added _OSI(Processor Device) Jan 23 01:45:06 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 23 01:45:06 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 23 01:45:06 localhost kernel: ACPI: Added _OSI(Linux-Dell-Video) Jan 23 01:45:06 localhost kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jan 23 01:45:06 localhost kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jan 23 01:45:06 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 23 01:45:06 localhost kernel: ACPI: Interpreter enabled Jan 23 01:45:06 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Jan 23 01:45:06 localhost kernel: ACPI: Using IOAPIC for interrupt routing Jan 23 01:45:06 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 23 01:45:06 localhost kernel: PCI: Using E820 reservations for host bridge windows Jan 23 01:45:06 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Jan 23 01:45:06 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 23 01:45:06 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Jan 23 01:45:06 localhost kernel: acpiphp: Slot [3] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [4] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [5] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [6] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [7] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [8] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [9] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [10] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [11] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [12] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [13] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [14] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [15] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [16] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [17] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [18] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [19] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [20] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [21] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [22] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [23] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [24] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [25] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [26] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [27] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [28] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [29] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [30] registered Jan 23 01:45:06 localhost kernel: acpiphp: Slot [31] registered Jan 23 01:45:06 localhost kernel: PCI host bridge to bus 0000:00 Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x440000000-0x4bfffffff window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 23 01:45:06 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Jan 23 01:45:06 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Jan 23 01:45:06 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Jan 23 01:45:06 localhost kernel: pci 0000:00:01.1: reg 0x20: [io 0xc140-0xc14f] Jan 23 01:45:06 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Jan 23 01:45:06 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Jan 23 01:45:06 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Jan 23 01:45:06 localhost kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Jan 23 01:45:06 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Jan 23 01:45:06 localhost kernel: pci 0000:00:01.2: reg 0x20: [io 0xc100-0xc11f] Jan 23 01:45:06 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Jan 23 01:45:06 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Jan 23 01:45:06 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 23 01:45:06 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Jan 23 01:45:06 localhost kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Jan 23 01:45:06 localhost kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Jan 23 01:45:06 localhost kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Jan 23 01:45:06 localhost kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Jan 23 01:45:06 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Jan 23 01:45:06 localhost kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Jan 23 01:45:06 localhost kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Jan 23 01:45:06 localhost kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Jan 23 01:45:06 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Jan 23 01:45:06 localhost kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Jan 23 01:45:06 localhost kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Jan 23 01:45:06 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Jan 23 01:45:06 localhost kernel: pci 0000:00:06.0: reg 0x10: [io 0xc120-0xc13f] Jan 23 01:45:06 localhost kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Jan 23 01:45:06 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jan 23 01:45:06 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jan 23 01:45:06 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jan 23 01:45:06 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jan 23 01:45:06 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Jan 23 01:45:06 localhost kernel: iommu: Default domain type: Translated Jan 23 01:45:06 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jan 23 01:45:06 localhost kernel: SCSI subsystem initialized Jan 23 01:45:06 localhost kernel: ACPI: bus type USB registered Jan 23 01:45:06 localhost kernel: usbcore: registered new interface driver usbfs Jan 23 01:45:06 localhost kernel: usbcore: registered new interface driver hub Jan 23 01:45:06 localhost kernel: usbcore: registered new device driver usb Jan 23 01:45:06 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Jan 23 01:45:06 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jan 23 01:45:06 localhost kernel: PTP clock support registered Jan 23 01:45:06 localhost kernel: EDAC MC: Ver: 3.0.0 Jan 23 01:45:06 localhost kernel: NetLabel: Initializing Jan 23 01:45:06 localhost kernel: NetLabel: domain hash size = 128 Jan 23 01:45:06 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Jan 23 01:45:06 localhost kernel: NetLabel: unlabeled traffic allowed by default Jan 23 01:45:06 localhost kernel: PCI: Using ACPI for IRQ routing Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Jan 23 01:45:06 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 23 01:45:06 localhost kernel: vgaarb: loaded Jan 23 01:45:06 localhost kernel: clocksource: Switched to clocksource kvm-clock Jan 23 01:45:06 localhost kernel: VFS: Disk quotas dquot_6.6.0 Jan 23 01:45:06 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 23 01:45:06 localhost kernel: pnp: PnP ACPI init Jan 23 01:45:06 localhost kernel: pnp: PnP ACPI: found 5 devices Jan 23 01:45:06 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 23 01:45:06 localhost kernel: NET: Registered PF_INET protocol family Jan 23 01:45:06 localhost kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 23 01:45:06 localhost kernel: tcp_listen_portaddr_hash hash table entries: 8192 (order: 5, 131072 bytes, linear) Jan 23 01:45:06 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jan 23 01:45:06 localhost kernel: TCP established hash table entries: 131072 (order: 8, 1048576 bytes, linear) Jan 23 01:45:06 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jan 23 01:45:06 localhost kernel: TCP: Hash tables configured (established 131072 bind 65536) Jan 23 01:45:06 localhost kernel: MPTCP token hash table entries: 16384 (order: 6, 393216 bytes, linear) Jan 23 01:45:06 localhost kernel: UDP hash table entries: 8192 (order: 6, 262144 bytes, linear) Jan 23 01:45:06 localhost kernel: UDP-Lite hash table entries: 8192 (order: 6, 262144 bytes, linear) Jan 23 01:45:06 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jan 23 01:45:06 localhost kernel: NET: Registered PF_XDP protocol family Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Jan 23 01:45:06 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x440000000-0x4bfffffff window] Jan 23 01:45:06 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Jan 23 01:45:06 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Jan 23 01:45:06 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Jan 23 01:45:06 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 27063 usecs Jan 23 01:45:06 localhost kernel: PCI: CLS 0 bytes, default 64 Jan 23 01:45:06 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jan 23 01:45:06 localhost kernel: Trying to unpack rootfs image as initramfs... Jan 23 01:45:06 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Jan 23 01:45:06 localhost kernel: ACPI: bus type thunderbolt registered Jan 23 01:45:06 localhost kernel: Initialise system trusted keyrings Jan 23 01:45:06 localhost kernel: Key type blacklist registered Jan 23 01:45:06 localhost kernel: workingset: timestamp_bits=36 max_order=22 bucket_order=0 Jan 23 01:45:06 localhost kernel: zbud: loaded Jan 23 01:45:06 localhost kernel: integrity: Platform Keyring initialized Jan 23 01:45:06 localhost kernel: NET: Registered PF_ALG protocol family Jan 23 01:45:06 localhost kernel: xor: automatically using best checksumming function avx Jan 23 01:45:06 localhost kernel: Key type asymmetric registered Jan 23 01:45:06 localhost kernel: Asymmetric key parser 'x509' registered Jan 23 01:45:06 localhost kernel: Running certificate verification selftests Jan 23 01:45:06 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Jan 23 01:45:06 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Jan 23 01:45:06 localhost kernel: io scheduler mq-deadline registered Jan 23 01:45:06 localhost kernel: io scheduler kyber registered Jan 23 01:45:06 localhost kernel: io scheduler bfq registered Jan 23 01:45:06 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Jan 23 01:45:06 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Jan 23 01:45:06 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Jan 23 01:45:06 localhost kernel: ACPI: button: Power Button [PWRF] Jan 23 01:45:06 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Jan 23 01:45:06 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Jan 23 01:45:06 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Jan 23 01:45:06 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 23 01:45:06 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 23 01:45:06 localhost kernel: Non-volatile memory driver v1.3 Jan 23 01:45:06 localhost kernel: rdac: device handler registered Jan 23 01:45:06 localhost kernel: hp_sw: device handler registered Jan 23 01:45:06 localhost kernel: emc: device handler registered Jan 23 01:45:06 localhost kernel: alua: device handler registered Jan 23 01:45:06 localhost kernel: libphy: Fixed MDIO Bus: probed Jan 23 01:45:06 localhost kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Jan 23 01:45:06 localhost kernel: ehci-pci: EHCI PCI platform driver Jan 23 01:45:06 localhost kernel: ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver Jan 23 01:45:06 localhost kernel: ohci-pci: OHCI PCI platform driver Jan 23 01:45:06 localhost kernel: uhci_hcd: USB Universal Host Controller Interface driver Jan 23 01:45:06 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Jan 23 01:45:06 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Jan 23 01:45:06 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Jan 23 01:45:06 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Jan 23 01:45:06 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Jan 23 01:45:06 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Jan 23 01:45:06 localhost kernel: usb usb1: Product: UHCI Host Controller Jan 23 01:45:06 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-284.11.1.el9_2.x86_64 uhci_hcd Jan 23 01:45:06 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Jan 23 01:45:06 localhost kernel: hub 1-0:1.0: USB hub found Jan 23 01:45:06 localhost kernel: hub 1-0:1.0: 2 ports detected Jan 23 01:45:06 localhost kernel: usbcore: registered new interface driver usbserial_generic Jan 23 01:45:06 localhost kernel: usbserial: USB Serial support registered for generic Jan 23 01:45:06 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 23 01:45:06 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 23 01:45:06 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 23 01:45:06 localhost kernel: mousedev: PS/2 mouse device common for all mice Jan 23 01:45:06 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 23 01:45:06 localhost kernel: rtc_cmos 00:04: registered as rtc0 Jan 23 01:45:06 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Jan 23 01:45:06 localhost kernel: rtc_cmos 00:04: setting system clock to 2026-01-23T06:45:05 UTC (1769150705) Jan 23 01:45:06 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Jan 23 01:45:06 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Jan 23 01:45:06 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Jan 23 01:45:06 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Jan 23 01:45:06 localhost kernel: usbcore: registered new interface driver usbhid Jan 23 01:45:06 localhost kernel: usbhid: USB HID core driver Jan 23 01:45:06 localhost kernel: drop_monitor: Initializing network drop monitor service Jan 23 01:45:06 localhost kernel: Initializing XFRM netlink socket Jan 23 01:45:06 localhost kernel: NET: Registered PF_INET6 protocol family Jan 23 01:45:06 localhost kernel: Segment Routing with IPv6 Jan 23 01:45:06 localhost kernel: NET: Registered PF_PACKET protocol family Jan 23 01:45:06 localhost kernel: mpls_gso: MPLS GSO support Jan 23 01:45:06 localhost kernel: IPI shorthand broadcast: enabled Jan 23 01:45:06 localhost kernel: AVX2 version of gcm_enc/dec engaged. Jan 23 01:45:06 localhost kernel: AES CTR mode by8 optimization enabled Jan 23 01:45:06 localhost kernel: sched_clock: Marking stable (760011215, 174263932)->(1060635358, -126360211) Jan 23 01:45:06 localhost kernel: registered taskstats version 1 Jan 23 01:45:06 localhost kernel: Loading compiled-in X.509 certificates Jan 23 01:45:06 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Jan 23 01:45:06 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Jan 23 01:45:06 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Jan 23 01:45:06 localhost kernel: zswap: loaded using pool lzo/zbud Jan 23 01:45:06 localhost kernel: page_owner is disabled Jan 23 01:45:06 localhost kernel: Key type big_key registered Jan 23 01:45:06 localhost kernel: Freeing initrd memory: 74232K Jan 23 01:45:06 localhost kernel: Key type encrypted registered Jan 23 01:45:06 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Jan 23 01:45:06 localhost kernel: Loading compiled-in module X.509 certificates Jan 23 01:45:06 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kernel signing key: aaec4b640ef162b54684864066c7d4ffd428cd72' Jan 23 01:45:06 localhost kernel: ima: Allocated hash algorithm: sha256 Jan 23 01:45:06 localhost kernel: ima: No architecture policies found Jan 23 01:45:06 localhost kernel: evm: Initialising EVM extended attributes: Jan 23 01:45:06 localhost kernel: evm: security.selinux Jan 23 01:45:06 localhost kernel: evm: security.SMACK64 (disabled) Jan 23 01:45:06 localhost kernel: evm: security.SMACK64EXEC (disabled) Jan 23 01:45:06 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Jan 23 01:45:06 localhost kernel: evm: security.SMACK64MMAP (disabled) Jan 23 01:45:06 localhost kernel: evm: security.apparmor (disabled) Jan 23 01:45:06 localhost kernel: evm: security.ima Jan 23 01:45:06 localhost kernel: evm: security.capability Jan 23 01:45:06 localhost kernel: evm: HMAC attrs: 0x1 Jan 23 01:45:06 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Jan 23 01:45:06 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Jan 23 01:45:06 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Jan 23 01:45:06 localhost kernel: usb 1-1: Product: QEMU USB Tablet Jan 23 01:45:06 localhost kernel: usb 1-1: Manufacturer: QEMU Jan 23 01:45:06 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Jan 23 01:45:06 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Jan 23 01:45:06 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Jan 23 01:45:06 localhost kernel: Freeing unused decrypted memory: 2036K Jan 23 01:45:06 localhost kernel: Freeing unused kernel image (initmem) memory: 2792K Jan 23 01:45:06 localhost kernel: Write protecting the kernel read-only data: 26624k Jan 23 01:45:06 localhost kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jan 23 01:45:06 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 60K Jan 23 01:45:06 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Jan 23 01:45:06 localhost kernel: Run /init as init process Jan 23 01:45:06 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 23 01:45:06 localhost systemd[1]: Detected virtualization kvm. Jan 23 01:45:06 localhost systemd[1]: Detected architecture x86-64. Jan 23 01:45:06 localhost systemd[1]: Running in initrd. Jan 23 01:45:06 localhost systemd[1]: No hostname configured, using default hostname. Jan 23 01:45:06 localhost systemd[1]: Hostname set to . Jan 23 01:45:06 localhost systemd[1]: Initializing machine ID from VM UUID. Jan 23 01:45:06 localhost systemd[1]: Queued start job for default target Initrd Default Target. Jan 23 01:45:06 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:06 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 23 01:45:06 localhost systemd[1]: Reached target Initrd /usr File System. Jan 23 01:45:06 localhost systemd[1]: Reached target Local File Systems. Jan 23 01:45:06 localhost systemd[1]: Reached target Path Units. Jan 23 01:45:06 localhost systemd[1]: Reached target Slice Units. Jan 23 01:45:06 localhost systemd[1]: Reached target Swaps. Jan 23 01:45:06 localhost systemd[1]: Reached target Timer Units. Jan 23 01:45:06 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 23 01:45:06 localhost systemd[1]: Listening on Journal Socket (/dev/log). Jan 23 01:45:06 localhost systemd[1]: Listening on Journal Socket. Jan 23 01:45:06 localhost systemd[1]: Listening on udev Control Socket. Jan 23 01:45:06 localhost systemd[1]: Listening on udev Kernel Socket. Jan 23 01:45:06 localhost systemd[1]: Reached target Socket Units. Jan 23 01:45:06 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 23 01:45:06 localhost systemd[1]: Starting Journal Service... Jan 23 01:45:06 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 01:45:06 localhost systemd[1]: Starting Create System Users... Jan 23 01:45:06 localhost systemd[1]: Starting Setup Virtual Console... Jan 23 01:45:06 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 23 01:45:06 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 01:45:06 localhost systemd-journald[284]: Journal started Jan 23 01:45:06 localhost systemd-journald[284]: Runtime Journal (/run/log/journal/09247d78f0a74c0b8d7ed244b8aabc42) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:06 localhost systemd-modules-load[285]: Module 'msr' is built in Jan 23 01:45:06 localhost systemd[1]: Started Journal Service. Jan 23 01:45:06 localhost systemd[1]: Finished Setup Virtual Console. Jan 23 01:45:06 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Jan 23 01:45:06 localhost systemd[1]: Starting dracut cmdline hook... Jan 23 01:45:06 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 01:45:06 localhost systemd-sysusers[286]: Creating group 'sgx' with GID 997. Jan 23 01:45:06 localhost systemd-sysusers[286]: Creating group 'users' with GID 100. Jan 23 01:45:06 localhost systemd-sysusers[286]: Creating group 'dbus' with GID 81. Jan 23 01:45:06 localhost systemd-sysusers[286]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Jan 23 01:45:06 localhost systemd[1]: Finished Create System Users. Jan 23 01:45:06 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 01:45:06 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 23 01:45:06 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 23 01:45:06 localhost dracut-cmdline[290]: dracut-9.2 (Plow) dracut-057-21.git20230214.el9 Jan 23 01:45:06 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 23 01:45:06 localhost dracut-cmdline[290]: Using kernel command line parameters: BOOT_IMAGE=(hd0,gpt3)/vmlinuz-5.14.0-284.11.1.el9_2.x86_64 root=UUID=a3dd82de-ffc6-4652-88b9-80e003b8f20a console=tty0 console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M Jan 23 01:45:06 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 23 01:45:06 localhost systemd[1]: Finished dracut cmdline hook. Jan 23 01:45:06 localhost systemd[1]: Starting dracut pre-udev hook... Jan 23 01:45:06 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jan 23 01:45:06 localhost kernel: device-mapper: uevent: version 1.0.3 Jan 23 01:45:06 localhost kernel: device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com Jan 23 01:45:06 localhost kernel: RPC: Registered named UNIX socket transport module. Jan 23 01:45:06 localhost kernel: RPC: Registered udp transport module. Jan 23 01:45:06 localhost kernel: RPC: Registered tcp transport module. Jan 23 01:45:06 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Jan 23 01:45:06 localhost rpc.statd[408]: Version 2.5.4 starting Jan 23 01:45:06 localhost rpc.statd[408]: Initializing NSM state Jan 23 01:45:06 localhost rpc.idmapd[413]: Setting log level to 0 Jan 23 01:45:06 localhost systemd[1]: Finished dracut pre-udev hook. Jan 23 01:45:06 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 23 01:45:06 localhost systemd-udevd[426]: Using default interface naming scheme 'rhel-9.0'. Jan 23 01:45:06 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 23 01:45:06 localhost systemd[1]: Starting dracut pre-trigger hook... Jan 23 01:45:06 localhost systemd[1]: Finished dracut pre-trigger hook. Jan 23 01:45:06 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 23 01:45:06 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 23 01:45:06 localhost systemd[1]: Reached target System Initialization. Jan 23 01:45:06 localhost systemd[1]: Reached target Basic System. Jan 23 01:45:06 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 23 01:45:06 localhost systemd[1]: Reached target Network. Jan 23 01:45:06 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Jan 23 01:45:06 localhost systemd[1]: Starting dracut initqueue hook... Jan 23 01:45:06 localhost kernel: virtio_blk virtio2: [vda] 838860800 512-byte logical blocks (429 GB/400 GiB) Jan 23 01:45:06 localhost kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jan 23 01:45:06 localhost kernel: GPT:20971519 != 838860799 Jan 23 01:45:06 localhost kernel: GPT:Alternate GPT header not at the end of the disk. Jan 23 01:45:06 localhost kernel: GPT:20971519 != 838860799 Jan 23 01:45:07 localhost kernel: GPT: Use GNU Parted to correct GPT errors. Jan 23 01:45:07 localhost kernel: vda: vda1 vda2 vda3 vda4 Jan 23 01:45:07 localhost kernel: scsi host0: ata_piix Jan 23 01:45:07 localhost kernel: scsi host1: ata_piix Jan 23 01:45:07 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 Jan 23 01:45:07 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 Jan 23 01:45:07 localhost systemd-udevd[445]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:45:07 localhost systemd[1]: Found device /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Jan 23 01:45:07 localhost systemd[1]: Reached target Initrd Root Device. Jan 23 01:45:07 localhost kernel: ata1: found unknown device (class 0) Jan 23 01:45:07 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 23 01:45:07 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 23 01:45:07 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Jan 23 01:45:07 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 23 01:45:07 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 23 01:45:07 localhost systemd[1]: Finished dracut initqueue hook. Jan 23 01:45:07 localhost systemd[1]: Reached target Preparation for Remote File Systems. Jan 23 01:45:07 localhost systemd[1]: Reached target Remote Encrypted Volumes. Jan 23 01:45:07 localhost systemd[1]: Reached target Remote File Systems. Jan 23 01:45:07 localhost systemd[1]: Starting dracut pre-mount hook... Jan 23 01:45:07 localhost systemd[1]: Finished dracut pre-mount hook. Jan 23 01:45:07 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a... Jan 23 01:45:07 localhost systemd-fsck[511]: /usr/sbin/fsck.xfs: XFS file system. Jan 23 01:45:07 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a. Jan 23 01:45:07 localhost systemd[1]: Mounting /sysroot... Jan 23 01:45:07 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Jan 23 01:45:07 localhost kernel: XFS (vda4): Mounting V5 Filesystem Jan 23 01:45:07 localhost kernel: XFS (vda4): Ending clean mount Jan 23 01:45:07 localhost systemd[1]: Mounted /sysroot. Jan 23 01:45:07 localhost systemd[1]: Reached target Initrd Root File System. Jan 23 01:45:07 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Jan 23 01:45:07 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Jan 23 01:45:07 localhost systemd[1]: Reached target Initrd File Systems. Jan 23 01:45:07 localhost systemd[1]: Reached target Initrd Default Target. Jan 23 01:45:07 localhost systemd[1]: Starting dracut mount hook... Jan 23 01:45:07 localhost systemd[1]: Finished dracut mount hook. Jan 23 01:45:07 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 23 01:45:07 localhost rpc.idmapd[413]: exiting on signal 15 Jan 23 01:45:07 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 23 01:45:07 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 23 01:45:07 localhost systemd[1]: Stopped target Network. Jan 23 01:45:07 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Jan 23 01:45:07 localhost systemd[1]: Stopped target Timer Units. Jan 23 01:45:07 localhost systemd[1]: dbus.socket: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Jan 23 01:45:07 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 23 01:45:07 localhost systemd[1]: Stopped target Initrd Default Target. Jan 23 01:45:07 localhost systemd[1]: Stopped target Basic System. Jan 23 01:45:07 localhost systemd[1]: Stopped target Initrd Root Device. Jan 23 01:45:07 localhost systemd[1]: Stopped target Initrd /usr File System. Jan 23 01:45:07 localhost systemd[1]: Stopped target Path Units. Jan 23 01:45:07 localhost systemd[1]: Stopped target Remote File Systems. Jan 23 01:45:07 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Jan 23 01:45:07 localhost systemd[1]: Stopped target Slice Units. Jan 23 01:45:07 localhost systemd[1]: Stopped target Socket Units. Jan 23 01:45:07 localhost systemd[1]: Stopped target System Initialization. Jan 23 01:45:07 localhost systemd[1]: Stopped target Local File Systems. Jan 23 01:45:07 localhost systemd[1]: Stopped target Swaps. Jan 23 01:45:07 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped dracut mount hook. Jan 23 01:45:07 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped dracut pre-mount hook. Jan 23 01:45:07 localhost systemd[1]: Stopped target Local Encrypted Volumes. Jan 23 01:45:07 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:07 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped dracut initqueue hook. Jan 23 01:45:07 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped Apply Kernel Variables. Jan 23 01:45:07 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped Load Kernel Modules. Jan 23 01:45:07 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped Create Volatile Files and Directories. Jan 23 01:45:07 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped Coldplug All udev Devices. Jan 23 01:45:07 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped dracut pre-trigger hook. Jan 23 01:45:07 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 23 01:45:07 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 23 01:45:07 localhost systemd[1]: Stopped Setup Virtual Console. Jan 23 01:45:08 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 23 01:45:08 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 23 01:45:08 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Closed udev Control Socket. Jan 23 01:45:08 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Closed udev Kernel Socket. Jan 23 01:45:08 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Stopped dracut pre-udev hook. Jan 23 01:45:08 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Stopped dracut cmdline hook. Jan 23 01:45:08 localhost systemd[1]: Starting Cleanup udev Database... Jan 23 01:45:08 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 23 01:45:08 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Stopped Create List of Static Device Nodes. Jan 23 01:45:08 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Stopped Create System Users. Jan 23 01:45:08 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Finished Cleanup udev Database. Jan 23 01:45:08 localhost systemd[1]: Reached target Switch Root. Jan 23 01:45:08 localhost systemd[1]: Starting Switch Root... Jan 23 01:45:08 localhost systemd[1]: Switching root. Jan 23 01:45:08 localhost systemd-journald[284]: Journal stopped Jan 23 01:45:08 localhost systemd-journald[284]: Received SIGTERM from PID 1 (systemd). Jan 23 01:45:08 localhost kernel: audit: type=1404 audit(1769150708.127:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Jan 23 01:45:08 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 01:45:08 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 01:45:08 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 01:45:08 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 01:45:08 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 01:45:08 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 01:45:08 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 01:45:08 localhost kernel: audit: type=1403 audit(1769150708.224:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 23 01:45:08 localhost systemd[1]: Successfully loaded SELinux policy in 98.608ms. Jan 23 01:45:08 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.100ms. Jan 23 01:45:08 localhost systemd[1]: systemd 252-13.el9_2 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 23 01:45:08 localhost systemd[1]: Detected virtualization kvm. Jan 23 01:45:08 localhost systemd[1]: Detected architecture x86-64. Jan 23 01:45:08 localhost systemd-rc-local-generator[582]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 01:45:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 01:45:08 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Stopped Switch Root. Jan 23 01:45:08 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 23 01:45:08 localhost systemd[1]: Created slice Slice /system/getty. Jan 23 01:45:08 localhost systemd[1]: Created slice Slice /system/modprobe. Jan 23 01:45:08 localhost systemd[1]: Created slice Slice /system/serial-getty. Jan 23 01:45:08 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Jan 23 01:45:08 localhost systemd[1]: Created slice Slice /system/systemd-fsck. Jan 23 01:45:08 localhost systemd[1]: Created slice User and Session Slice. Jan 23 01:45:08 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 23 01:45:08 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 23 01:45:08 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 23 01:45:08 localhost systemd[1]: Reached target Local Encrypted Volumes. Jan 23 01:45:08 localhost systemd[1]: Stopped target Switch Root. Jan 23 01:45:08 localhost systemd[1]: Stopped target Initrd File Systems. Jan 23 01:45:08 localhost systemd[1]: Stopped target Initrd Root File System. Jan 23 01:45:08 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Jan 23 01:45:08 localhost systemd[1]: Reached target Path Units. Jan 23 01:45:08 localhost systemd[1]: Reached target rpc_pipefs.target. Jan 23 01:45:08 localhost systemd[1]: Reached target Slice Units. Jan 23 01:45:08 localhost systemd[1]: Reached target Swaps. Jan 23 01:45:08 localhost systemd[1]: Reached target Local Verity Protected Volumes. Jan 23 01:45:08 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Jan 23 01:45:08 localhost systemd[1]: Reached target RPC Port Mapper. Jan 23 01:45:08 localhost systemd[1]: Listening on Process Core Dump Socket. Jan 23 01:45:08 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 23 01:45:08 localhost systemd[1]: Listening on udev Control Socket. Jan 23 01:45:08 localhost systemd[1]: Listening on udev Kernel Socket. Jan 23 01:45:08 localhost systemd[1]: Mounting Huge Pages File System... Jan 23 01:45:08 localhost systemd[1]: Mounting POSIX Message Queue File System... Jan 23 01:45:08 localhost systemd[1]: Mounting Kernel Debug File System... Jan 23 01:45:08 localhost systemd[1]: Mounting Kernel Trace File System... Jan 23 01:45:08 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 23 01:45:08 localhost systemd[1]: Starting Create List of Static Device Nodes... Jan 23 01:45:08 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 23 01:45:08 localhost systemd[1]: Starting Load Kernel Module drm... Jan 23 01:45:08 localhost systemd[1]: Starting Load Kernel Module fuse... Jan 23 01:45:08 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Jan 23 01:45:08 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Stopped File System Check on Root Device. Jan 23 01:45:08 localhost systemd[1]: Stopped Journal Service. Jan 23 01:45:08 localhost systemd[1]: Starting Journal Service... Jan 23 01:45:08 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 01:45:08 localhost systemd[1]: Starting Generate network units from Kernel command line... Jan 23 01:45:08 localhost kernel: fuse: init (API version 7.36) Jan 23 01:45:08 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Jan 23 01:45:08 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Jan 23 01:45:08 localhost systemd[1]: Starting Coldplug All udev Devices... Jan 23 01:45:08 localhost systemd-journald[618]: Journal started Jan 23 01:45:08 localhost systemd-journald[618]: Runtime Journal (/run/log/journal/3e33164a5d30c3060156ec878079cfde) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:08 localhost systemd[1]: Queued start job for default target Multi-User System. Jan 23 01:45:08 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd-modules-load[619]: Module 'msr' is built in Jan 23 01:45:08 localhost systemd[1]: Mounted Huge Pages File System. Jan 23 01:45:08 localhost systemd[1]: Started Journal Service. Jan 23 01:45:08 localhost systemd[1]: Mounted POSIX Message Queue File System. Jan 23 01:45:08 localhost systemd[1]: Mounted Kernel Debug File System. Jan 23 01:45:08 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Jan 23 01:45:08 localhost systemd[1]: Mounted Kernel Trace File System. Jan 23 01:45:08 localhost systemd[1]: Finished Create List of Static Device Nodes. Jan 23 01:45:08 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 23 01:45:08 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Finished Load Kernel Module fuse. Jan 23 01:45:08 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Jan 23 01:45:08 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 01:45:08 localhost systemd[1]: Finished Generate network units from Kernel command line. Jan 23 01:45:08 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Jan 23 01:45:08 localhost systemd[1]: Mounting FUSE Control File System... Jan 23 01:45:08 localhost systemd[1]: Mounting Kernel Configuration File System... Jan 23 01:45:08 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 23 01:45:08 localhost systemd[1]: Starting Rebuild Hardware Database... Jan 23 01:45:08 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Jan 23 01:45:08 localhost systemd[1]: Starting Load/Save Random Seed... Jan 23 01:45:08 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 01:45:08 localhost kernel: ACPI: bus type drm_connector registered Jan 23 01:45:08 localhost systemd-journald[618]: Runtime Journal (/run/log/journal/3e33164a5d30c3060156ec878079cfde) is 8.0M, max 314.7M, 306.7M free. Jan 23 01:45:08 localhost systemd-journald[618]: Received client request to flush runtime journal. Jan 23 01:45:08 localhost systemd[1]: Starting Create System Users... Jan 23 01:45:08 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 23 01:45:08 localhost systemd[1]: Finished Load Kernel Module drm. Jan 23 01:45:08 localhost systemd[1]: Mounted FUSE Control File System. Jan 23 01:45:08 localhost systemd[1]: Mounted Kernel Configuration File System. Jan 23 01:45:08 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Jan 23 01:45:08 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 01:45:08 localhost systemd[1]: Finished Load/Save Random Seed. Jan 23 01:45:08 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Jan 23 01:45:08 localhost systemd-sysusers[631]: Creating group 'sgx' with GID 989. Jan 23 01:45:08 localhost systemd-sysusers[631]: Creating group 'systemd-oom' with GID 988. Jan 23 01:45:08 localhost systemd-sysusers[631]: Creating user 'systemd-oom' (systemd Userspace OOM Killer) with UID 988 and GID 988. Jan 23 01:45:08 localhost systemd[1]: Finished Coldplug All udev Devices. Jan 23 01:45:08 localhost systemd[1]: Finished Create System Users. Jan 23 01:45:08 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Jan 23 01:45:08 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Jan 23 01:45:08 localhost systemd[1]: Reached target Preparation for Local File Systems. Jan 23 01:45:08 localhost systemd[1]: Set up automount EFI System Partition Automount. Jan 23 01:45:09 localhost systemd[1]: Finished Rebuild Hardware Database. Jan 23 01:45:09 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 23 01:45:09 localhost systemd-udevd[635]: Using default interface naming scheme 'rhel-9.0'. Jan 23 01:45:09 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 23 01:45:09 localhost systemd[1]: Starting Load Kernel Module configfs... Jan 23 01:45:09 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Jan 23 01:45:09 localhost systemd-udevd[640]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:45:09 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 23 01:45:09 localhost systemd[1]: Finished Load Kernel Module configfs. Jan 23 01:45:09 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/b141154b-6a70-437a-a97f-d160c9ba37eb being skipped. Jan 23 01:45:09 localhost systemd[1]: Condition check resulted in /dev/disk/by-uuid/7B77-95E7 being skipped. Jan 23 01:45:09 localhost systemd[1]: Mounting /boot... Jan 23 01:45:09 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/7B77-95E7... Jan 23 01:45:09 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Jan 23 01:45:09 localhost kernel: XFS (vda3): Mounting V5 Filesystem Jan 23 01:45:09 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Jan 23 01:45:09 localhost kernel: XFS (vda3): Ending clean mount Jan 23 01:45:09 localhost kernel: xfs filesystem being mounted at /boot supports timestamps until 2038 (0x7fffffff) Jan 23 01:45:09 localhost systemd[1]: Mounted /boot. Jan 23 01:45:09 localhost systemd-fsck[687]: fsck.fat 4.2 (2021-01-31) Jan 23 01:45:09 localhost systemd-fsck[687]: /dev/vda2: 12 files, 1782/51145 clusters Jan 23 01:45:09 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/7B77-95E7. Jan 23 01:45:09 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Jan 23 01:45:09 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Jan 23 01:45:09 localhost kernel: SVM: TSC scaling supported Jan 23 01:45:09 localhost kernel: kvm: Nested Virtualization enabled Jan 23 01:45:09 localhost kernel: SVM: kvm: Nested Paging enabled Jan 23 01:45:09 localhost kernel: SVM: LBR virtualization supported Jan 23 01:45:09 localhost kernel: Console: switching to colour dummy device 80x25 Jan 23 01:45:09 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Jan 23 01:45:09 localhost kernel: [drm] features: -context_init Jan 23 01:45:09 localhost kernel: [drm] number of scanouts: 1 Jan 23 01:45:09 localhost kernel: [drm] number of cap sets: 0 Jan 23 01:45:09 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 0 for virtio0 on minor 0 Jan 23 01:45:09 localhost kernel: virtio_gpu virtio0: [drm] drm_plane_enable_fb_damage_clips() not called Jan 23 01:45:09 localhost kernel: Console: switching to colour frame buffer device 128x48 Jan 23 01:45:09 localhost kernel: virtio_gpu virtio0: [drm] fb0: virtio_gpudrmfb frame buffer device Jan 23 01:45:09 localhost systemd[1]: Mounting /boot/efi... Jan 23 01:45:09 localhost systemd[1]: Mounted /boot/efi. Jan 23 01:45:09 localhost systemd[1]: Reached target Local File Systems. Jan 23 01:45:09 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 23 01:45:09 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Jan 23 01:45:09 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Jan 23 01:45:09 localhost systemd[1]: Store a System Token in an EFI Variable was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:09 localhost systemd[1]: Starting Automatic Boot Loader Update... Jan 23 01:45:09 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Jan 23 01:45:09 localhost systemd[1]: Starting Create Volatile Files and Directories... Jan 23 01:45:09 localhost systemd[1]: efi.automount: Got automount request for /efi, triggered by 714 (bootctl) Jan 23 01:45:09 localhost systemd[1]: Starting File System Check on /dev/vda2... Jan 23 01:45:09 localhost systemd[1]: Finished File System Check on /dev/vda2. Jan 23 01:45:09 localhost systemd[1]: Mounting EFI System Partition Automount... Jan 23 01:45:09 localhost systemd[1]: Mounted EFI System Partition Automount. Jan 23 01:45:09 localhost systemd[1]: Finished Automatic Boot Loader Update. Jan 23 01:45:09 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 23 01:45:09 localhost systemd[1]: Finished Create Volatile Files and Directories. Jan 23 01:45:09 localhost systemd[1]: Starting Security Auditing Service... Jan 23 01:45:09 localhost systemd[1]: Starting RPC Bind... Jan 23 01:45:09 localhost systemd[1]: Starting Rebuild Journal Catalog... Jan 23 01:45:09 localhost auditd[725]: audit dispatcher initialized with q_depth=1200 and 1 active plugins Jan 23 01:45:09 localhost auditd[725]: Init complete, auditd 3.0.7 listening for events (startup state enable) Jan 23 01:45:09 localhost systemd[1]: Finished Rebuild Journal Catalog. Jan 23 01:45:09 localhost systemd[1]: Starting Update is Completed... Jan 23 01:45:09 localhost systemd[1]: Started RPC Bind. Jan 23 01:45:09 localhost systemd[1]: Finished Update is Completed. Jan 23 01:45:09 localhost augenrules[730]: /sbin/augenrules: No change Jan 23 01:45:09 localhost augenrules[741]: No rules Jan 23 01:45:09 localhost augenrules[741]: enabled 1 Jan 23 01:45:09 localhost augenrules[741]: failure 1 Jan 23 01:45:09 localhost augenrules[741]: pid 725 Jan 23 01:45:09 localhost augenrules[741]: rate_limit 0 Jan 23 01:45:09 localhost augenrules[741]: backlog_limit 8192 Jan 23 01:45:09 localhost augenrules[741]: lost 0 Jan 23 01:45:09 localhost augenrules[741]: backlog 3 Jan 23 01:45:09 localhost augenrules[741]: backlog_wait_time 60000 Jan 23 01:45:09 localhost augenrules[741]: backlog_wait_time_actual 0 Jan 23 01:45:09 localhost augenrules[741]: enabled 1 Jan 23 01:45:09 localhost augenrules[741]: failure 1 Jan 23 01:45:09 localhost augenrules[741]: pid 725 Jan 23 01:45:09 localhost augenrules[741]: rate_limit 0 Jan 23 01:45:09 localhost augenrules[741]: backlog_limit 8192 Jan 23 01:45:09 localhost augenrules[741]: lost 0 Jan 23 01:45:09 localhost augenrules[741]: backlog 3 Jan 23 01:45:09 localhost augenrules[741]: backlog_wait_time 60000 Jan 23 01:45:09 localhost augenrules[741]: backlog_wait_time_actual 0 Jan 23 01:45:09 localhost augenrules[741]: enabled 1 Jan 23 01:45:09 localhost augenrules[741]: failure 1 Jan 23 01:45:09 localhost augenrules[741]: pid 725 Jan 23 01:45:09 localhost augenrules[741]: rate_limit 0 Jan 23 01:45:09 localhost augenrules[741]: backlog_limit 8192 Jan 23 01:45:09 localhost augenrules[741]: lost 0 Jan 23 01:45:09 localhost augenrules[741]: backlog 3 Jan 23 01:45:09 localhost augenrules[741]: backlog_wait_time 60000 Jan 23 01:45:09 localhost augenrules[741]: backlog_wait_time_actual 0 Jan 23 01:45:09 localhost systemd[1]: Started Security Auditing Service. Jan 23 01:45:09 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 23 01:45:09 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 23 01:45:09 localhost systemd[1]: Reached target System Initialization. Jan 23 01:45:09 localhost systemd[1]: Started dnf makecache --timer. Jan 23 01:45:09 localhost systemd[1]: Started Daily rotation of log files. Jan 23 01:45:09 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 23 01:45:09 localhost systemd[1]: Reached target Timer Units. Jan 23 01:45:09 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 23 01:45:09 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Jan 23 01:45:09 localhost systemd[1]: Reached target Socket Units. Jan 23 01:45:09 localhost systemd[1]: Starting Initial cloud-init job (pre-networking)... Jan 23 01:45:09 localhost systemd[1]: Starting D-Bus System Message Bus... Jan 23 01:45:09 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:10 localhost systemd[1]: Started D-Bus System Message Bus. Jan 23 01:45:10 localhost systemd[1]: Reached target Basic System. Jan 23 01:45:10 localhost journal[750]: Ready Jan 23 01:45:10 localhost systemd[1]: Starting NTP client/server... Jan 23 01:45:10 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Jan 23 01:45:10 localhost systemd[1]: Started irqbalance daemon. Jan 23 01:45:10 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Jan 23 01:45:10 localhost systemd[1]: Starting System Logging Service... Jan 23 01:45:10 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:10 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:10 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 01:45:10 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 01:45:10 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Jan 23 01:45:10 localhost systemd[1]: Reached target User and Group Name Lookups. Jan 23 01:45:10 localhost rsyslogd[758]: [origin software="rsyslogd" swVersion="8.2102.0-111.el9" x-pid="758" x-info="https://www.rsyslog.com"] start Jan 23 01:45:10 localhost rsyslogd[758]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2040 ] Jan 23 01:45:10 localhost systemd[1]: Starting User Login Management... Jan 23 01:45:10 localhost systemd[1]: Started System Logging Service. Jan 23 01:45:10 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Jan 23 01:45:10 localhost chronyd[765]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 01:45:10 localhost chronyd[765]: Using right/UTC timezone to obtain leap second data Jan 23 01:45:10 localhost chronyd[765]: Loaded seccomp filter (level 2) Jan 23 01:45:10 localhost systemd[1]: Started NTP client/server. Jan 23 01:45:10 localhost systemd-logind[762]: New seat seat0. Jan 23 01:45:10 localhost systemd-logind[762]: Watching system buttons on /dev/input/event0 (Power Button) Jan 23 01:45:10 localhost systemd-logind[762]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 23 01:45:10 localhost systemd[1]: Started User Login Management. Jan 23 01:45:10 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 01:45:10 localhost cloud-init[769]: Cloud-init v. 22.1-9.el9 running 'init-local' at Fri, 23 Jan 2026 06:45:10 +0000. Up 5.56 seconds. Jan 23 01:45:10 localhost systemd[1]: Starting Hostname Service... Jan 23 01:45:10 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpa_idsq96.mount: Deactivated successfully. Jan 23 01:45:10 localhost systemd[1]: Started Hostname Service. Jan 23 01:45:10 localhost systemd-hostnamed[783]: Hostname set to (static) Jan 23 01:45:10 localhost systemd[1]: Finished Initial cloud-init job (pre-networking). Jan 23 01:45:10 localhost systemd[1]: Reached target Preparation for Network. Jan 23 01:45:10 localhost systemd[1]: Starting Network Manager... Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8601] NetworkManager (version 1.42.2-1.el9) is starting... (boot:9dd23834-b10f-484c-b6a1-aed74df6ecfa) Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8607] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Jan 23 01:45:10 localhost systemd[1]: Started Network Manager. Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8662] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Jan 23 01:45:10 localhost systemd[1]: Reached target Network. Jan 23 01:45:10 localhost systemd[1]: Starting Network Manager Wait Online... Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8751] manager[0x5564c201d020]: monitoring kernel firmware directory '/lib/firmware'. Jan 23 01:45:10 localhost systemd[1]: Starting GSSAPI Proxy Daemon... Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8791] hostname: hostname: using hostnamed Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8791] hostname: static hostname changed from (none) to "np0005593101.novalocal" Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8799] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Jan 23 01:45:10 localhost systemd[1]: Starting Enable periodic update of entitlement certificates.... Jan 23 01:45:10 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 01:45:10 localhost systemd[1]: Started Enable periodic update of entitlement certificates.. Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8964] manager[0x5564c201d020]: rfkill: Wi-Fi hardware radio set enabled Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.8966] manager[0x5564c201d020]: rfkill: WWAN hardware radio set enabled Jan 23 01:45:10 localhost systemd[1]: Started GSSAPI Proxy Daemon. Jan 23 01:45:10 localhost systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9036] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9038] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9047] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9050] manager: Networking is enabled by state file Jan 23 01:45:10 localhost systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Jan 23 01:45:10 localhost systemd[1]: Reached target NFS client services. Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9078] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Jan 23 01:45:10 localhost systemd[1]: Reached target Preparation for Remote File Systems. Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9080] settings: Loaded settings plugin: keyfile (internal) Jan 23 01:45:10 localhost systemd[1]: Reached target Remote File Systems. Jan 23 01:45:10 localhost systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9125] dhcp: init: Using DHCP client 'internal' Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9132] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9153] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9162] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9176] device (lo): Activation: starting connection 'lo' (d5e59fef-9ae2-403c-adca-c12d7d719a65) Jan 23 01:45:10 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9196] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9201] device (eth0): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9246] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9251] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9255] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9259] device (eth0): carrier: link connected Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9265] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9273] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9309] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9316] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:45:10 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9319] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9323] manager: NetworkManager state is now CONNECTING Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9327] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9349] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9355] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9376] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9380] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9388] device (lo): Activation: successful, device activated. Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9410] dhcp4 (eth0): state changed new lease, address=38.102.83.236 Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9417] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9449] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9485] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9490] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'managed') Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9497] manager: NetworkManager state is now CONNECTED_SITE Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9501] device (eth0): Activation: successful, device activated. Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9508] manager: NetworkManager state is now CONNECTED_GLOBAL Jan 23 01:45:10 localhost NetworkManager[788]: [1769150710.9515] manager: startup complete Jan 23 01:45:10 localhost systemd[1]: Finished Network Manager Wait Online. Jan 23 01:45:10 localhost systemd[1]: Starting Initial cloud-init job (metadata service crawler)... Jan 23 01:45:11 localhost cloud-init[987]: Cloud-init v. 22.1-9.el9 running 'init' at Fri, 23 Jan 2026 06:45:11 +0000. Up 6.41 seconds. Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | eth0 | True | 38.102.83.236 | 255.255.255.0 | global | fa:16:3e:26:d9:ab | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | eth0 | True | fe80::f816:3eff:fe26:d9ab/64 | . | link | fa:16:3e:26:d9:ab | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | lo | True | ::1/128 | . | host | . | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | Route | Destination | Gateway | Interface | Flags | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: | 3 | multicast | :: | eth0 | U | Jan 23 01:45:11 localhost cloud-init[987]: ci-info: +-------+-------------+---------+-----------+-------+ Jan 23 01:45:11 localhost systemd[1]: Starting Authorization Manager... Jan 23 01:45:11 localhost polkitd[1035]: Started polkitd version 0.117 Jan 23 01:45:11 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 01:45:11 localhost systemd[1]: Started Authorization Manager. Jan 23 01:45:13 localhost cloud-init[987]: Generating public/private rsa key pair. Jan 23 01:45:13 localhost cloud-init[987]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Jan 23 01:45:13 localhost cloud-init[987]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Jan 23 01:45:13 localhost cloud-init[987]: The key fingerprint is: Jan 23 01:45:13 localhost cloud-init[987]: SHA256:UBqYxpNYvshduLhZerpJdVADWX5PowMuBliENYXGXjw root@np0005593101.novalocal Jan 23 01:45:13 localhost cloud-init[987]: The key's randomart image is: Jan 23 01:45:13 localhost cloud-init[987]: +---[RSA 3072]----+ Jan 23 01:45:13 localhost cloud-init[987]: | ==B+B= . | Jan 23 01:45:13 localhost cloud-init[987]: |.o=oE+ = | Jan 23 01:45:13 localhost cloud-init[987]: |.o.o+o* . o | Jan 23 01:45:13 localhost cloud-init[987]: | ..= * + + . | Jan 23 01:45:13 localhost cloud-init[987]: | + O o S . | Jan 23 01:45:13 localhost cloud-init[987]: | B o . | Jan 23 01:45:13 localhost cloud-init[987]: | = . | Jan 23 01:45:13 localhost cloud-init[987]: | . + | Jan 23 01:45:13 localhost cloud-init[987]: | +. | Jan 23 01:45:13 localhost cloud-init[987]: +----[SHA256]-----+ Jan 23 01:45:13 localhost cloud-init[987]: Generating public/private ecdsa key pair. Jan 23 01:45:13 localhost cloud-init[987]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Jan 23 01:45:13 localhost cloud-init[987]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Jan 23 01:45:13 localhost cloud-init[987]: The key fingerprint is: Jan 23 01:45:13 localhost cloud-init[987]: SHA256:hiMrxa4yAPB49BnljUSNnU3t0kWo0kk0YG7LRZJW7M4 root@np0005593101.novalocal Jan 23 01:45:13 localhost cloud-init[987]: The key's randomart image is: Jan 23 01:45:13 localhost cloud-init[987]: +---[ECDSA 256]---+ Jan 23 01:45:13 localhost cloud-init[987]: | o+++X*. o. | Jan 23 01:45:13 localhost cloud-init[987]: |. . .o.=*o+.o . | Jan 23 01:45:13 localhost cloud-init[987]: |.+ . oo.++.= . | Jan 23 01:45:13 localhost cloud-init[987]: |o o.o +.o* o | Jan 23 01:45:13 localhost cloud-init[987]: |.. + o S+ . | Jan 23 01:45:13 localhost cloud-init[987]: |. o o o E | Jan 23 01:45:13 localhost cloud-init[987]: |. . o | Jan 23 01:45:13 localhost cloud-init[987]: |o o | Jan 23 01:45:13 localhost cloud-init[987]: | o. | Jan 23 01:45:13 localhost cloud-init[987]: +----[SHA256]-----+ Jan 23 01:45:13 localhost cloud-init[987]: Generating public/private ed25519 key pair. Jan 23 01:45:13 localhost cloud-init[987]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Jan 23 01:45:13 localhost cloud-init[987]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Jan 23 01:45:13 localhost cloud-init[987]: The key fingerprint is: Jan 23 01:45:13 localhost cloud-init[987]: SHA256:rgLpYK2ZU6wKwgV4bjbm42SFMYVbcV5NilRyh9yXiaM root@np0005593101.novalocal Jan 23 01:45:13 localhost cloud-init[987]: The key's randomart image is: Jan 23 01:45:13 localhost cloud-init[987]: +--[ED25519 256]--+ Jan 23 01:45:13 localhost cloud-init[987]: | .o.+o+=o. o | Jan 23 01:45:13 localhost cloud-init[987]: |. ...+ =oo= + | Jan 23 01:45:13 localhost cloud-init[987]: |..+o o .. o | Jan 23 01:45:13 localhost cloud-init[987]: | oo+ E | Jan 23 01:45:13 localhost cloud-init[987]: | Xo. S | Jan 23 01:45:13 localhost cloud-init[987]: |o*+* . | Jan 23 01:45:13 localhost cloud-init[987]: |++@. . | Jan 23 01:45:13 localhost cloud-init[987]: |oX... . | Jan 23 01:45:13 localhost cloud-init[987]: |o o .. | Jan 23 01:45:13 localhost cloud-init[987]: +----[SHA256]-----+ Jan 23 01:45:14 localhost systemd[1]: Finished Initial cloud-init job (metadata service crawler). Jan 23 01:45:14 localhost systemd[1]: Reached target Cloud-config availability. Jan 23 01:45:14 localhost systemd[1]: Reached target Network is Online. Jan 23 01:45:14 localhost systemd[1]: Starting Apply the settings specified in cloud-config... Jan 23 01:45:14 localhost systemd[1]: Run Insights Client at boot was skipped because of an unmet condition check (ConditionPathExists=/etc/insights-client/.run_insights_client_next_boot). Jan 23 01:45:14 localhost systemd[1]: Starting Crash recovery kernel arming... Jan 23 01:45:14 localhost systemd[1]: Starting Notify NFS peers of a restart... Jan 23 01:45:14 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 01:45:14 localhost systemd[1]: Starting Permit User Sessions... Jan 23 01:45:14 localhost sm-notify[1127]: Version 2.5.4 starting Jan 23 01:45:14 localhost systemd[1]: Started Notify NFS peers of a restart. Jan 23 01:45:14 localhost sshd[1128]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:14 localhost systemd[1]: Finished Permit User Sessions. Jan 23 01:45:14 localhost systemd[1]: Started Command Scheduler. Jan 23 01:45:14 localhost systemd[1]: Started Getty on tty1. Jan 23 01:45:14 localhost systemd[1]: Started Serial Getty on ttyS0. Jan 23 01:45:14 localhost systemd[1]: Reached target Login Prompts. Jan 23 01:45:14 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 01:45:14 localhost systemd[1]: Reached target Multi-User System. Jan 23 01:45:14 localhost systemd[1]: Starting Record Runlevel Change in UTMP... Jan 23 01:45:14 localhost systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 23 01:45:14 localhost systemd[1]: Finished Record Runlevel Change in UTMP. Jan 23 01:45:14 localhost kdumpctl[1133]: kdump: No kdump initial ramdisk found. Jan 23 01:45:14 localhost kdumpctl[1133]: kdump: Rebuilding /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img Jan 23 01:45:14 localhost cloud-init[1247]: Cloud-init v. 22.1-9.el9 running 'modules:config' at Fri, 23 Jan 2026 06:45:14 +0000. Up 9.43 seconds. Jan 23 01:45:14 localhost systemd[1]: Finished Apply the settings specified in cloud-config. Jan 23 01:45:14 localhost systemd[1]: Starting Execute cloud user/final scripts... Jan 23 01:45:14 localhost dracut[1414]: dracut-057-21.git20230214.el9 Jan 23 01:45:14 localhost cloud-init[1419]: Cloud-init v. 22.1-9.el9 running 'modules:final' at Fri, 23 Jan 2026 06:45:14 +0000. Up 9.79 seconds. Jan 23 01:45:14 localhost cloud-init[1432]: ############################################################# Jan 23 01:45:14 localhost cloud-init[1433]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Jan 23 01:45:14 localhost cloud-init[1438]: 256 SHA256:hiMrxa4yAPB49BnljUSNnU3t0kWo0kk0YG7LRZJW7M4 root@np0005593101.novalocal (ECDSA) Jan 23 01:45:14 localhost cloud-init[1446]: 256 SHA256:rgLpYK2ZU6wKwgV4bjbm42SFMYVbcV5NilRyh9yXiaM root@np0005593101.novalocal (ED25519) Jan 23 01:45:14 localhost dracut[1416]: Executing: /usr/bin/dracut --add kdumpbase --quiet --hostonly --hostonly-cmdline --hostonly-i18n --hostonly-mode strict --hostonly-nics -o "plymouth resume ifcfg earlykdump" --mount "/dev/disk/by-uuid/a3dd82de-ffc6-4652-88b9-80e003b8f20a /sysroot xfs rw,relatime,seclabel,attr2,inode64,logbufs=8,logbsize=32k,noquota" --squash-compressor zstd --no-hostonly-default-device -f /boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img 5.14.0-284.11.1.el9_2.x86_64 Jan 23 01:45:14 localhost cloud-init[1452]: 3072 SHA256:UBqYxpNYvshduLhZerpJdVADWX5PowMuBliENYXGXjw root@np0005593101.novalocal (RSA) Jan 23 01:45:14 localhost cloud-init[1455]: -----END SSH HOST KEY FINGERPRINTS----- Jan 23 01:45:14 localhost cloud-init[1457]: ############################################################# Jan 23 01:45:14 localhost cloud-init[1419]: Cloud-init v. 22.1-9.el9 finished at Fri, 23 Jan 2026 06:45:14 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.05 seconds Jan 23 01:45:14 localhost systemd[1]: Reloading Network Manager... Jan 23 01:45:14 localhost NetworkManager[788]: [1769150714.9568] audit: op="reload" arg="0" pid=1542 uid=0 result="success" Jan 23 01:45:14 localhost NetworkManager[788]: [1769150714.9577] config: signal: SIGHUP (no changes from disk) Jan 23 01:45:14 localhost dracut[1416]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Jan 23 01:45:14 localhost systemd[1]: Reloaded Network Manager. Jan 23 01:45:14 localhost dracut[1416]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Jan 23 01:45:14 localhost systemd[1]: Finished Execute cloud user/final scripts. Jan 23 01:45:14 localhost dracut[1416]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Jan 23 01:45:14 localhost systemd[1]: Reached target Cloud-init target. Jan 23 01:45:14 localhost dracut[1416]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 23 01:45:14 localhost dracut[1416]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 23 01:45:15 localhost dracut[1416]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 23 01:45:15 localhost dracut[1416]: memstrack is not available Jan 23 01:45:15 localhost dracut[1416]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 23 01:45:15 localhost dracut[1416]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Jan 23 01:45:15 localhost dracut[1416]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Jan 23 01:45:15 localhost dracut[1416]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Jan 23 01:45:15 localhost dracut[1416]: memstrack is not available Jan 23 01:45:15 localhost dracut[1416]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Jan 23 01:45:15 localhost dracut[1416]: *** Including module: systemd *** Jan 23 01:45:16 localhost chronyd[765]: Selected source 23.133.168.247 (2.rhel.pool.ntp.org) Jan 23 01:45:16 localhost chronyd[765]: System clock TAI offset set to 37 seconds Jan 23 01:45:16 localhost dracut[1416]: *** Including module: systemd-initrd *** Jan 23 01:45:16 localhost dracut[1416]: *** Including module: i18n *** Jan 23 01:45:16 localhost dracut[1416]: No KEYMAP configured. Jan 23 01:45:16 localhost dracut[1416]: *** Including module: drm *** Jan 23 01:45:16 localhost dracut[1416]: *** Including module: prefixdevname *** Jan 23 01:45:16 localhost dracut[1416]: *** Including module: kernel-modules *** Jan 23 01:45:17 localhost dracut[1416]: *** Including module: kernel-modules-extra *** Jan 23 01:45:17 localhost dracut[1416]: *** Including module: qemu *** Jan 23 01:45:17 localhost dracut[1416]: *** Including module: fstab-sys *** Jan 23 01:45:17 localhost dracut[1416]: *** Including module: rootfs-block *** Jan 23 01:45:17 localhost dracut[1416]: *** Including module: terminfo *** Jan 23 01:45:17 localhost dracut[1416]: *** Including module: udev-rules *** Jan 23 01:45:18 localhost dracut[1416]: Skipping udev rule: 91-permissions.rules Jan 23 01:45:18 localhost dracut[1416]: Skipping udev rule: 80-drivers-modprobe.rules Jan 23 01:45:18 localhost dracut[1416]: *** Including module: virtiofs *** Jan 23 01:45:18 localhost dracut[1416]: *** Including module: dracut-systemd *** Jan 23 01:45:18 localhost dracut[1416]: *** Including module: usrmount *** Jan 23 01:45:18 localhost dracut[1416]: *** Including module: base *** Jan 23 01:45:18 localhost dracut[1416]: *** Including module: fs-lib *** Jan 23 01:45:18 localhost dracut[1416]: *** Including module: kdumpbase *** Jan 23 01:45:18 localhost dracut[1416]: *** Including module: microcode_ctl-fw_dir_override *** Jan 23 01:45:18 localhost dracut[1416]: microcode_ctl module: mangling fw_dir Jan 23 01:45:18 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Jan 23 01:45:18 localhost dracut[1416]: microcode_ctl: configuration "intel" is ignored Jan 23 01:45:18 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: configuration "intel-06-2d-07" is ignored Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: configuration "intel-06-4e-03" is ignored Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: configuration "intel-06-4f-01" is ignored Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: configuration "intel-06-55-04" is ignored Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: configuration "intel-06-5e-03" is ignored Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: configuration "intel-06-8c-01" is ignored Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: configuration "intel-06-8e-9e-0x-0xca" is ignored Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: configuration "intel-06-8e-9e-0x-dell" is ignored Jan 23 01:45:19 localhost dracut[1416]: microcode_ctl: final fw_dir: "/lib/firmware/updates/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware/updates /lib/firmware/5.14.0-284.11.1.el9_2.x86_64 /lib/firmware" Jan 23 01:45:19 localhost dracut[1416]: *** Including module: shutdown *** Jan 23 01:45:19 localhost dracut[1416]: *** Including module: squash *** Jan 23 01:45:19 localhost dracut[1416]: *** Including modules done *** Jan 23 01:45:19 localhost dracut[1416]: *** Installing kernel module dependencies *** Jan 23 01:45:20 localhost dracut[1416]: *** Installing kernel module dependencies done *** Jan 23 01:45:20 localhost dracut[1416]: *** Resolving executable dependencies *** Jan 23 01:45:21 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:45:21 localhost dracut[1416]: *** Resolving executable dependencies done *** Jan 23 01:45:21 localhost dracut[1416]: *** Hardlinking files *** Jan 23 01:45:21 localhost dracut[1416]: Mode: real Jan 23 01:45:21 localhost dracut[1416]: Files: 1099 Jan 23 01:45:21 localhost dracut[1416]: Linked: 3 files Jan 23 01:45:21 localhost dracut[1416]: Compared: 0 xattrs Jan 23 01:45:21 localhost dracut[1416]: Compared: 373 files Jan 23 01:45:21 localhost dracut[1416]: Saved: 61.04 KiB Jan 23 01:45:21 localhost dracut[1416]: Duration: 0.027330 seconds Jan 23 01:45:21 localhost dracut[1416]: *** Hardlinking files done *** Jan 23 01:45:21 localhost dracut[1416]: Could not find 'strip'. Not stripping the initramfs. Jan 23 01:45:21 localhost dracut[1416]: *** Generating early-microcode cpio image *** Jan 23 01:45:21 localhost dracut[1416]: *** Constructing AuthenticAMD.bin *** Jan 23 01:45:21 localhost dracut[1416]: *** Store current command line parameters *** Jan 23 01:45:21 localhost dracut[1416]: Stored kernel commandline: Jan 23 01:45:21 localhost dracut[1416]: No dracut internal kernel commandline stored in the initramfs Jan 23 01:45:21 localhost dracut[1416]: *** Install squash loader *** Jan 23 01:45:22 localhost dracut[1416]: *** Squashing the files inside the initramfs *** Jan 23 01:45:23 localhost dracut[1416]: *** Squashing the files inside the initramfs done *** Jan 23 01:45:23 localhost dracut[1416]: *** Creating image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' *** Jan 23 01:45:23 localhost dracut[1416]: *** Creating initramfs image file '/boot/initramfs-5.14.0-284.11.1.el9_2.x86_64kdump.img' done *** Jan 23 01:45:23 localhost kdumpctl[1133]: kdump: kexec: loaded kdump kernel Jan 23 01:45:23 localhost kdumpctl[1133]: kdump: Starting kdump: [OK] Jan 23 01:45:23 localhost systemd[1]: Finished Crash recovery kernel arming. Jan 23 01:45:23 localhost systemd[1]: Startup finished in 1.250s (kernel) + 2.095s (initrd) + 15.635s (userspace) = 18.981s. Jan 23 01:45:25 localhost sshd[4150]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4152]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4154]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4156]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4158]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4160]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4162]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4164]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:25 localhost sshd[4166]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:40 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 01:45:47 localhost sshd[4171]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:45:48 localhost systemd[1]: Created slice User Slice of UID 1000. Jan 23 01:45:48 localhost systemd[1]: Starting User Runtime Directory /run/user/1000... Jan 23 01:45:48 localhost systemd-logind[762]: New session 1 of user zuul. Jan 23 01:45:48 localhost systemd[1]: Finished User Runtime Directory /run/user/1000. Jan 23 01:45:48 localhost systemd[1]: Starting User Manager for UID 1000... Jan 23 01:45:48 localhost systemd[4175]: Queued start job for default target Main User Target. Jan 23 01:45:48 localhost systemd[4175]: Created slice User Application Slice. Jan 23 01:45:48 localhost systemd[4175]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 01:45:48 localhost systemd[4175]: Started Daily Cleanup of User's Temporary Directories. Jan 23 01:45:48 localhost systemd[4175]: Reached target Paths. Jan 23 01:45:48 localhost systemd[4175]: Reached target Timers. Jan 23 01:45:48 localhost systemd[4175]: Starting D-Bus User Message Bus Socket... Jan 23 01:45:48 localhost systemd[4175]: Starting Create User's Volatile Files and Directories... Jan 23 01:45:48 localhost systemd[4175]: Finished Create User's Volatile Files and Directories. Jan 23 01:45:48 localhost systemd[4175]: Listening on D-Bus User Message Bus Socket. Jan 23 01:45:48 localhost systemd[4175]: Reached target Sockets. Jan 23 01:45:48 localhost systemd[4175]: Reached target Basic System. Jan 23 01:45:48 localhost systemd[4175]: Reached target Main User Target. Jan 23 01:45:48 localhost systemd[4175]: Startup finished in 143ms. Jan 23 01:45:48 localhost systemd[1]: Started User Manager for UID 1000. Jan 23 01:45:48 localhost systemd[1]: Started Session 1 of User zuul. Jan 23 01:45:48 localhost python3[4227]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:45:54 localhost python3[4246]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:04 localhost python3[4299]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:05 localhost python3[4329]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Jan 23 01:46:08 localhost python3[4345]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDA22S1/hH+74ZumLmJ/jHPUBPUomvGp3s6RqnOgAdA7cefJomWVOgkqwlIoxK5FTcArrD88mi9sN+lvzN/kGGPgykDsWzPpE9b4way9UPOaDSLS04NNjNF7tr+BuHrN6LIUkYCWLs3icRmrwYU2v6dkBelWRDqyHXucSgfvBPJxUU9/01SjH0DQu0XkkKS+xqKi8AcUdmj7ZW/5Ep/v7R8xdZNDwvG67wt0sgMSmVqVP0qfeU8Yi0cLZ65R1eMSD8dwMfsDi/s5qP/FALaWGZZlTqzronkoY3LH5RIbNnqGd28182cfxXDod4kAS2vbyzUYyYdRja0QCp29mgD4AV8WO4HYj5hJ4CrXz1UfDeBqsOKxEzgD8An+1jSdyh39tjsSCMG4j2Zp6s4SjmkEKix1MXqp7578FrwHzVM4K9kOXf1xqlzHLv/dLdfPIw2EOHM/kyCHdHKDVUaH1DFVBF0ZyrN57RFJvEoiw3RgfyDhzZK6hIMyNXDqGQ45hLVjOE= zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:09 localhost python3[4359]: ansible-file Invoked with state=directory path=/home/zuul/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:10 localhost python3[4418]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:10 localhost python3[4459]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769150770.1125302-341-151628127042284/source dest=/home/zuul/.ssh/id_rsa mode=384 force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa follow=False checksum=332ac6e5e102fad0efb63e7711468addf4cebb64 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:12 localhost python3[4532]: ansible-ansible.legacy.stat Invoked with path=/home/zuul/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:12 localhost python3[4573]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769150771.8983905-440-150578703658985/source dest=/home/zuul/.ssh/id_rsa.pub mode=420 force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa.pub follow=False checksum=a2dfb4df29ea2fda7d7e4b28a63ca08610edd25d backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:14 localhost python3[4601]: ansible-ping Invoked with data=pong Jan 23 01:46:16 localhost python3[4615]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 01:46:21 localhost python3[4668]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Jan 23 01:46:23 localhost chronyd[765]: Selected source 23.128.92.19 (2.rhel.pool.ntp.org) Jan 23 01:46:23 localhost python3[4690]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:23 localhost python3[4704]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:23 localhost python3[4718]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4732]: ansible-file Invoked with path=/home/zuul/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4746]: ansible-file Invoked with path=/home/zuul/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:25 localhost python3[4760]: ansible-file Invoked with path=/home/zuul/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:28 localhost python3[4776]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:29 localhost python3[4824]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:29 localhost python3[4867]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul/.ansible/tmp/ansible-tmp-1769150789.019736-54-274036674073643/source follow=False _original_basename=mirror_info.sh.j2 checksum=92d92a03afdddee82732741071f662c729080c35 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:31 localhost python3[4896]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA4Z/c9osaGGtU6X8fgELwfj/yayRurfcKA0HMFfdpPxev2dbwljysMuzoVp4OZmW1gvGtyYPSNRvnzgsaabPNKNo2ym5NToCP6UM+KSe93aln4BcM/24mXChYAbXJQ5Bqq/pIzsGs/pKetQN+vwvMxLOwTvpcsCJBXaa981RKML6xj9l/UZ7IIq1HSEKMvPLxZMWdu0Ut8DkCd5F4nOw9Wgml2uYpDCj5LLCrQQ9ChdOMz8hz6SighhNlRpPkvPaet3OXxr/ytFMu7j7vv06CaEnuMMiY2aTWN1Imin9eHAylIqFHta/3gFfQSWt9jXM7owkBLKL7ATzhaAn+fjNupw== arxcruz@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:31 localhost python3[4910]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS4Fn6k4deCnIlOtLWqZJyksbepjQt04j8Ed8CGx9EKkj0fKiAxiI4TadXQYPuNHMixZy4Nevjb6aDhL5Z906TfvNHKUrjrG7G26a0k8vdc61NEQ7FmcGMWRLwwc6ReDO7lFpzYKBMk4YqfWgBuGU/K6WLKiVW2cVvwIuGIaYrE1OiiX0iVUUk7KApXlDJMXn7qjSYynfO4mF629NIp8FJal38+Kv+HA+0QkE5Y2xXnzD4Lar5+keymiCHRntPppXHeLIRzbt0gxC7v3L72hpQ3BTBEzwHpeS8KY+SX1y5lRMN45thCHfJqGmARJREDjBvWG8JXOPmVIKQtZmVcD5b mandreou@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:31 localhost python3[4924]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC9MiLfy30deHA7xPOAlew5qUq3UP2gmRMYJi8PtkjFB20/DKeWwWNnkZPqP9AayruRoo51SIiVg870gbZE2jYl+Ncx/FYDe56JeC3ySZsXoAVkC9bP7gkOGqOmJjirvAgPMI7bogVz8i+66Q4Ar7OKTp3762G4IuWPPEg4ce4Y7lx9qWocZapHYq4cYKMxrOZ7SEbFSATBbe2bPZAPKTw8do/Eny+Hq/LkHFhIeyra6cqTFQYShr+zPln0Cr+ro/pDX3bB+1ubFgTpjpkkkQsLhDfR6cCdCWM2lgnS3BTtYj5Ct9/JRPR5YOphqZz+uB+OEu2IL68hmU9vNTth1KeX rlandy@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4938]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFCbgz8gdERiJlk2IKOtkjQxEXejrio6ZYMJAVJYpOIp raukadah@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4952]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBqb3Q/9uDf4LmihQ7xeJ9gA/STIQUFPSfyyV0m8AoQi bshewale@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4966]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0I8QqQx0Az2ysJt2JuffucLijhBqnsXKEIx5GyHwxVULROa8VtNFXUDH6ZKZavhiMcmfHB2+TBTda+lDP4FldYj06dGmzCY+IYGa+uDRdxHNGYjvCfLFcmLlzRK6fNbTcui+KlUFUdKe0fb9CRoGKyhlJD5GRkM1Dv+Yb6Bj+RNnmm1fVGYxzmrD2utvffYEb0SZGWxq2R9gefx1q/3wCGjeqvufEV+AskPhVGc5T7t9eyZ4qmslkLh1/nMuaIBFcr9AUACRajsvk6mXrAN1g3HlBf2gQlhi1UEyfbqIQvzzFtsbLDlSum/KmKjy818GzvWjERfQ0VkGzCd9bSLVL dviroel@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:32 localhost python3[4980]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDLOQd4ZLtkZXQGY6UwAr/06ppWQK4fDO3HaqxPk98csyOCBXsliSKK39Bso828+5srIXiW7aI6aC9P5mwi4mUZlGPfJlQbfrcGvY+b/SocuvaGK+1RrHLoJCT52LBhwgrzlXio2jeksZeein8iaTrhsPrOAs7KggIL/rB9hEiB3NaOPWhhoCP4vlW6MEMExGcqB/1FVxXFBPnLkEyW0Lk7ycVflZl2ocRxbfjZi0+tI1Wlinp8PvSQSc/WVrAcDgKjc/mB4ODPOyYy3G8FHgfMsrXSDEyjBKgLKMsdCrAUcqJQWjkqXleXSYOV4q3pzL+9umK+q/e3P/bIoSFQzmJKTU1eDfuvPXmow9F5H54fii/Da7ezlMJ+wPGHJrRAkmzvMbALy7xwswLhZMkOGNtRcPqaKYRmIBKpw3o6bCTtcNUHOtOQnzwY8JzrM2eBWJBXAANYw+9/ho80JIiwhg29CFNpVBuHbql2YxJQNrnl90guN65rYNpDxdIluweyUf8= anbanerj@kaermorhen manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[4994]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 dasm@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5008]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUnwjB20UKmsSed9X73eGNV5AOEFccQ3NYrRW776pEk cjeanner manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5022]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDercCMGn8rW1C4P67tHgtflPdTeXlpyUJYH+6XDd2lR jgilaber@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:33 localhost python3[5036]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAMI6kkg9Wg0sG7jIJmyZemEBwUn1yzNpQQd3gnulOmZ adrianfuscoarnejo@gmail.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5050]: ansible-authorized_key Invoked with user=zuul state=present key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBPijwpQu/3jhhhBZInXNOLEH57DrknPc3PLbsRvYyJIFzwYjX+WD4a7+nGnMYS42MuZk6TJcVqgnqofVx4isoD4= ramishra@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5064]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGpU/BepK3qX0NRf5Np+dOBDqzQEefhNrw2DCZaH3uWW rebtoor@monolith manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5078]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDK0iKdi8jQTpQrDdLVH/AAgLVYyTXF7AQ1gjc/5uT3t ykarel@yatinkarel manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:34 localhost python3[5092]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF/V/cLotA6LZeO32VL45Hd78skuA2lJA425Sm2LlQeZ fmount@horcrux manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5106]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDa7QCjuDMVmRPo1rREbGwzYeBCYVN+Ou/3WKXZEC6Sr manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5120]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 averdagu@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:35 localhost python3[5134]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 ashigupt@ashigupt.remote.csb manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5148]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOKLl0NYKwoZ/JY5KeZU8VwRAggeOxqQJeoqp3dsAaY9 manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5162]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIASASQOH2BcOyLKuuDOdWZlPi2orcjcA8q4400T73DLH evallesp@fedora manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5176]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILeBWlamUph+jRKV2qrx1PGU7vWuGIt5+z9k96I8WehW amsinha@amsinha-mac manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:36 localhost python3[5190]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIANvVgvJBlK3gb1yz5uef/JqIGq4HLEmY2dYA8e37swb morenod@redhat-laptop manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5204]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-rsa 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 brjackma@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5218]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKwedoZ0TWPJX/z/4TAbO/kKcDZOQVgRH0hAqrL5UCI1 vcastell@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:37 localhost python3[5232]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEmv8sE8GCk6ZTPIqF0FQrttBdL3mq7rCm/IJy0xDFh7 michburk@redhat.com manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:38 localhost python3[5246]: ansible-authorized_key Invoked with user=zuul state=present key=ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICy6GpGEtwevXEEn4mmLR5lmSLe23dGgAvzkB9DMNbkf rsafrono@rsafrono manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 01:46:45 localhost python3[5262]: ansible-community.general.timezone Invoked with name=UTC hwclock=None Jan 23 01:46:45 localhost systemd[1]: Starting Time & Date Service... Jan 23 01:46:46 localhost systemd[1]: Started Time & Date Service. Jan 23 01:46:46 localhost systemd-timedated[5264]: Changed time zone to 'UTC' (UTC). Jan 23 01:46:48 localhost python3[5283]: ansible-file Invoked with path=/etc/nodepool state=directory mode=511 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:49 localhost python3[5329]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:50 localhost python3[5370]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes src=/home/zuul/.ansible/tmp/ansible-tmp-1769150809.496767-451-180736943965130/source _original_basename=tmpbea40ux3 follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:51 localhost python3[5430]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:51 localhost python3[5471]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/sub_nodes_private src=/home/zuul/.ansible/tmp/ansible-tmp-1769150811.1068323-540-139028473313420/source _original_basename=tmpnm8u0y9k follow=False checksum=da39a3ee5e6b4b0d3255bfef95601890afd80709 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:53 localhost python3[5533]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:53 localhost python3[5576]: ansible-ansible.legacy.copy Invoked with dest=/etc/nodepool/node_private src=/home/zuul/.ansible/tmp/ansible-tmp-1769150813.0537193-684-145263324125387/source _original_basename=tmp_0d4uizm follow=False checksum=958c7c038fe74051d420f8f1aa402f4dafe9a187 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:55 localhost python3[5604]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa /etc/nodepool/id_rsa zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:46:55 localhost python3[5620]: ansible-ansible.legacy.command Invoked with _raw_params=cp .ssh/id_rsa.pub /etc/nodepool/id_rsa.pub zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:46:56 localhost python3[5670]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/zuul-sudo-grep follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:46:56 localhost python3[5713]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/zuul-sudo-grep mode=288 src=/home/zuul/.ansible/tmp/ansible-tmp-1769150816.3533866-810-232594698296646/source _original_basename=tmpxamk26od follow=False checksum=bdca1a77493d00fb51567671791f4aa30f66c2f0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:46:58 localhost python3[5744]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/visudo -c zuul_log_id=fa163ec2-ffbe-a2b6-1805-000000000023-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:47:00 localhost python3[5762]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=env#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a2b6-1805-000000000024-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 23 01:47:02 localhost python3[5780]: ansible-file Invoked with path=/home/zuul/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:47:16 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Jan 23 01:47:24 localhost python3[5799]: ansible-ansible.builtin.file Invoked with path=/etc/ci/env state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:48:13 localhost systemd[4175]: Starting Mark boot as successful... Jan 23 01:48:13 localhost systemd[4175]: Finished Mark boot as successful. Jan 23 01:48:24 localhost systemd-logind[762]: Session 1 logged out. Waiting for processes to exit. Jan 23 01:49:11 localhost systemd[1]: Unmounting EFI System Partition Automount... Jan 23 01:49:11 localhost systemd[1]: efi.mount: Deactivated successfully. Jan 23 01:49:11 localhost systemd[1]: Unmounted EFI System Partition Automount. Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: [1af4:1000] type 00 class 0x020000 Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: reg 0x10: [io 0x0000-0x003f] Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: reg 0x14: [mem 0x00000000-0x00000fff] Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: reg 0x20: [mem 0x00000000-0x00003fff 64bit pref] Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x0007ffff pref] Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: BAR 6: assigned [mem 0xc0000000-0xc007ffff pref] Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: BAR 4: assigned [mem 0x440000000-0x440003fff 64bit pref] Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: BAR 1: assigned [mem 0xc0080000-0xc0080fff] Jan 23 01:49:17 localhost kernel: pci 0000:00:07.0: BAR 0: assigned [io 0x1000-0x103f] Jan 23 01:49:17 localhost kernel: virtio-pci 0000:00:07.0: enabling device (0000 -> 0003) Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7524] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Jan 23 01:49:17 localhost systemd-udevd[5806]: Network interface NamePolicy= disabled on kernel command line. Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7687] device (eth1): state change: unmanaged -> unavailable (reason 'managed', sys-iface-state: 'external') Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7721] settings: (eth1): created default wired connection 'Wired connection 1' Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7726] device (eth1): carrier: link connected Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7730] device (eth1): state change: unavailable -> disconnected (reason 'carrier-changed', sys-iface-state: 'managed') Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7738] policy: auto-activating connection 'Wired connection 1' (bb126b64-5212-3e09-8af8-6953c92edf31) Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7746] device (eth1): Activation: starting connection 'Wired connection 1' (bb126b64-5212-3e09-8af8-6953c92edf31) Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7748] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'managed') Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7755] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'managed') Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7766] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'managed') Jan 23 01:49:17 localhost NetworkManager[788]: [1769150957.7771] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:49:18 localhost sshd[5808]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:49:18 localhost systemd-logind[762]: New session 3 of user zuul. Jan 23 01:49:18 localhost systemd[1]: Started Session 3 of User zuul. Jan 23 01:49:18 localhost kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready Jan 23 01:49:18 localhost python3[5825]: ansible-ansible.legacy.command Invoked with _raw_params=ip -j link zuul_log_id=fa163ec2-ffbe-a5a1-fbdc-000000000254-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:49:32 localhost python3[5875]: ansible-ansible.legacy.stat Invoked with path=/etc/NetworkManager/system-connections/ci-private-network.nmconnection follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:49:32 localhost python3[5918]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769150971.6907706-282-207396771301806/source dest=/etc/NetworkManager/system-connections/ci-private-network.nmconnection mode=0600 owner=root group=root follow=False _original_basename=bootstrap-ci-network-nm-connection.nmconnection.j2 checksum=ec140b8786f438f20b0939dd914bd7e72f7fbfb0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:49:32 localhost python3[5948]: ansible-ansible.builtin.systemd Invoked with name=NetworkManager state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 01:49:32 localhost systemd[1]: NetworkManager-wait-online.service: Deactivated successfully. Jan 23 01:49:32 localhost systemd[1]: Stopped Network Manager Wait Online. Jan 23 01:49:32 localhost systemd[1]: Stopping Network Manager Wait Online... Jan 23 01:49:32 localhost systemd[1]: Stopping Network Manager... Jan 23 01:49:32 localhost NetworkManager[788]: [1769150972.9286] caught SIGTERM, shutting down normally. Jan 23 01:49:32 localhost NetworkManager[788]: [1769150972.9389] dhcp4 (eth0): canceled DHCP transaction Jan 23 01:49:32 localhost NetworkManager[788]: [1769150972.9390] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:49:32 localhost NetworkManager[788]: [1769150972.9390] dhcp4 (eth0): state changed no lease Jan 23 01:49:32 localhost NetworkManager[788]: [1769150972.9394] manager: NetworkManager state is now CONNECTING Jan 23 01:49:32 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:49:32 localhost NetworkManager[788]: [1769150972.9519] dhcp4 (eth1): canceled DHCP transaction Jan 23 01:49:32 localhost NetworkManager[788]: [1769150972.9519] dhcp4 (eth1): state changed no lease Jan 23 01:49:32 localhost NetworkManager[788]: [1769150972.9601] exiting (success) Jan 23 01:49:32 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:49:32 localhost systemd[1]: NetworkManager.service: Deactivated successfully. Jan 23 01:49:32 localhost systemd[1]: Stopped Network Manager. Jan 23 01:49:32 localhost systemd[1]: NetworkManager.service: Consumed 1.310s CPU time. Jan 23 01:49:32 localhost systemd[1]: Starting Network Manager... Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.0141] NetworkManager (version 1.42.2-1.el9) is starting... (after a restart, boot:9dd23834-b10f-484c-b6a1-aed74df6ecfa) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.0144] Read config: /etc/NetworkManager/NetworkManager.conf (run: 15-carrier-timeout.conf) Jan 23 01:49:33 localhost systemd[1]: Started Network Manager. Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.0165] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Jan 23 01:49:33 localhost systemd[1]: Starting Network Manager Wait Online... Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.0217] manager[0x5610ad316090]: monitoring kernel firmware directory '/lib/firmware'. Jan 23 01:49:33 localhost systemd[1]: Starting Hostname Service... Jan 23 01:49:33 localhost systemd[1]: Started Hostname Service. Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1082] hostname: hostname: using hostnamed Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1086] hostname: static hostname changed from (none) to "np0005593101.novalocal" Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1093] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1100] manager[0x5610ad316090]: rfkill: Wi-Fi hardware radio set enabled Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1100] manager[0x5610ad316090]: rfkill: WWAN hardware radio set enabled Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1141] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-device-plugin-team.so) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1141] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1142] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1143] manager: Networking is enabled by state file Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1152] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.42.2-1.el9/libnm-settings-plugin-ifcfg-rh.so") Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1153] settings: Loaded settings plugin: keyfile (internal) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1198] dhcp: init: Using DHCP client 'internal' Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1202] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1210] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1218] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'external') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1231] device (lo): Activation: starting connection 'lo' (d5e59fef-9ae2-403c-adca-c12d7d719a65) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1240] device (eth0): carrier: link connected Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1246] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1253] manager: (eth0): assume: will attempt to assume matching connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) (indicated) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1254] device (eth0): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1263] device (eth0): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1273] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1281] device (eth1): carrier: link connected Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1286] manager: (eth1): new Ethernet device (/org/freedesktop/NetworkManager/Devices/3) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1294] manager: (eth1): assume: will attempt to assume matching connection 'Wired connection 1' (bb126b64-5212-3e09-8af8-6953c92edf31) (indicated) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1295] device (eth1): state change: unmanaged -> unavailable (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1302] device (eth1): state change: unavailable -> disconnected (reason 'connection-assumed', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1313] device (eth1): Activation: starting connection 'Wired connection 1' (bb126b64-5212-3e09-8af8-6953c92edf31) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1341] device (lo): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'external') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1344] device (lo): state change: prepare -> config (reason 'none', sys-iface-state: 'external') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1346] device (lo): state change: config -> ip-config (reason 'none', sys-iface-state: 'external') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1349] device (eth0): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1354] device (eth0): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1358] device (eth1): state change: disconnected -> prepare (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1362] device (eth1): state change: prepare -> config (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1366] device (lo): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'external') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1374] device (eth0): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1377] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1393] device (eth1): state change: config -> ip-config (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1399] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1437] dhcp4 (eth0): state changed new lease, address=38.102.83.236 Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1445] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1571] device (lo): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'external') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1575] device (eth0): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1589] device (lo): state change: secondaries -> activated (reason 'none', sys-iface-state: 'external') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1596] device (lo): Activation: successful, device activated. Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1640] device (eth0): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1643] device (eth0): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1648] manager: NetworkManager state is now CONNECTED_SITE Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1653] device (eth0): Activation: successful, device activated. Jan 23 01:49:33 localhost NetworkManager[5961]: [1769150973.1660] manager: NetworkManager state is now CONNECTED_GLOBAL Jan 23 01:49:33 localhost python3[6012]: ansible-ansible.legacy.command Invoked with _raw_params=ip route zuul_log_id=fa163ec2-ffbe-a5a1-fbdc-0000000000ff-0-controller zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:49:43 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:50:03 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 01:50:18 localhost NetworkManager[5961]: [1769151018.7805] device (eth1): state change: ip-config -> ip-check (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:18 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 01:50:18 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 01:50:18 localhost NetworkManager[5961]: [1769151018.8029] device (eth1): state change: ip-check -> secondaries (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:18 localhost NetworkManager[5961]: [1769151018.8031] device (eth1): state change: secondaries -> activated (reason 'none', sys-iface-state: 'assume') Jan 23 01:50:18 localhost NetworkManager[5961]: [1769151018.8040] device (eth1): Activation: successful, device activated. Jan 23 01:50:18 localhost NetworkManager[5961]: [1769151018.8048] manager: startup complete Jan 23 01:50:18 localhost systemd[1]: Finished Network Manager Wait Online. Jan 23 01:50:28 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 01:50:33 localhost systemd[1]: session-3.scope: Deactivated successfully. Jan 23 01:50:33 localhost systemd[1]: session-3.scope: Consumed 1.487s CPU time. Jan 23 01:50:33 localhost systemd-logind[762]: Session 3 logged out. Waiting for processes to exit. Jan 23 01:50:33 localhost systemd-logind[762]: Removed session 3. Jan 23 01:51:13 localhost systemd[4175]: Created slice User Background Tasks Slice. Jan 23 01:51:13 localhost systemd[4175]: Starting Cleanup of User's Temporary Files and Directories... Jan 23 01:51:13 localhost systemd[4175]: Finished Cleanup of User's Temporary Files and Directories. Jan 23 01:53:02 localhost sshd[6049]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:53:02 localhost systemd-logind[762]: New session 4 of user zuul. Jan 23 01:53:02 localhost systemd[1]: Started Session 4 of User zuul. Jan 23 01:53:02 localhost python3[6100]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/env/networking-info.yml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:53:03 localhost python3[6143]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/env/networking-info.yml owner=root group=root mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1769151182.6354682-628-278509023760412/source _original_basename=tmpj67sirq1 follow=False checksum=3cd9da767fb0a14eec4f313122c38d87bc876a69 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:53:10 localhost systemd[1]: session-4.scope: Deactivated successfully. Jan 23 01:53:10 localhost systemd-logind[762]: Session 4 logged out. Waiting for processes to exit. Jan 23 01:53:10 localhost systemd-logind[762]: Removed session 4. Jan 23 01:57:24 localhost sshd[6161]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:57:24 localhost sshd[6162]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:59:00 localhost sshd[6164]: main: sshd: ssh-rsa algorithm is disabled Jan 23 01:59:00 localhost systemd-logind[762]: New session 5 of user zuul. Jan 23 01:59:00 localhost systemd[1]: Started Session 5 of User zuul. Jan 23 01:59:00 localhost python3[6183]: ansible-ansible.legacy.command Invoked with _raw_params=lsblk -nd -o MAJ:MIN /dev/vda#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-7446-e1de-000000002191-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:01 localhost python3[6202]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/init.scope state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6218]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/machine.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6234]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/system.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:02 localhost python3[6251]: ansible-ansible.builtin.file Invoked with path=/sys/fs/cgroup/user.slice state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:04 localhost python3[6267]: ansible-ansible.builtin.file Invoked with path=/etc/systemd/system.conf.d state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:04 localhost python3[6315]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system.conf.d/override.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 01:59:05 localhost python3[6358]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system.conf.d/override.conf mode=0644 src=/home/zuul/.ansible/tmp/ansible-tmp-1769151544.6463306-612-111933069992599/source _original_basename=tmpil8ck1et follow=False checksum=a05098bd3d2321238ea1169d0e6f135b35b392d4 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 01:59:06 localhost python3[6388]: ansible-ansible.builtin.systemd_service Invoked with daemon_reload=True daemon_reexec=False scope=system no_block=False name=None state=None enabled=None force=None masked=None Jan 23 01:59:06 localhost systemd[1]: Reloading. Jan 23 01:59:07 localhost systemd-rc-local-generator[6406]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 01:59:07 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 01:59:08 localhost python3[6435]: ansible-ansible.builtin.wait_for Invoked with path=/sys/fs/cgroup/system.slice/io.max state=present timeout=30 host=127.0.0.1 connect_timeout=5 delay=0 active_connection_states=['ESTABLISHED', 'FIN_WAIT1', 'FIN_WAIT2', 'SYN_RECV', 'SYN_SENT', 'TIME_WAIT'] sleep=1 port=None search_regex=None exclude_hosts=None msg=None Jan 23 01:59:09 localhost python3[6451]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/init.scope/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:09 localhost python3[6469]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/machine.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:09 localhost python3[6487]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/system.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:10 localhost python3[6505]: ansible-ansible.legacy.command Invoked with _raw_params=echo "252:0 riops=18000 wiops=18000 rbps=262144000 wbps=262144000" > /sys/fs/cgroup/user.slice/io.max#012 _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:12 localhost python3[6522]: ansible-ansible.legacy.command Invoked with _raw_params=echo "init"; cat /sys/fs/cgroup/init.scope/io.max; echo "machine"; cat /sys/fs/cgroup/machine.slice/io.max; echo "system"; cat /sys/fs/cgroup/system.slice/io.max; echo "user"; cat /sys/fs/cgroup/user.slice/io.max;#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-7446-e1de-000000002198-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 01:59:12 localhost python3[6542]: ansible-ansible.builtin.stat Invoked with path=/sys/fs/cgroup/kubepods.slice/io.max follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 01:59:15 localhost systemd[1]: session-5.scope: Deactivated successfully. Jan 23 01:59:15 localhost systemd[1]: session-5.scope: Consumed 4.074s CPU time. Jan 23 01:59:15 localhost systemd-logind[762]: Session 5 logged out. Waiting for processes to exit. Jan 23 01:59:15 localhost systemd-logind[762]: Removed session 5. Jan 23 02:00:13 localhost systemd[1]: Starting Cleanup of Temporary Directories... Jan 23 02:00:13 localhost systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Jan 23 02:00:13 localhost systemd[1]: Finished Cleanup of Temporary Directories. Jan 23 02:00:13 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Jan 23 02:00:16 localhost sshd[6552]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:00:16 localhost systemd-logind[762]: New session 6 of user zuul. Jan 23 02:00:16 localhost systemd[1]: Started Session 6 of User zuul. Jan 23 02:00:16 localhost systemd[1]: Starting RHSM dbus service... Jan 23 02:00:17 localhost systemd[1]: Started RHSM dbus service. Jan 23 02:00:17 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:17 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:24 localhost rhsm-service[6576]: INFO [subscription_manager.managerlib:90] Consumer created: np0005593101.novalocal (037813df-37fe-49a1-bb66-068f76544ff4) Jan 23 02:00:24 localhost subscription-manager[6576]: Registered system with identity: 037813df-37fe-49a1-bb66-068f76544ff4 Jan 23 02:00:31 localhost rhsm-service[6576]: INFO [subscription_manager.entcertlib:131] certs updated: Jan 23 02:00:31 localhost rhsm-service[6576]: Total updates: 1 Jan 23 02:00:31 localhost rhsm-service[6576]: Found (local) serial# [] Jan 23 02:00:31 localhost rhsm-service[6576]: Expected (UEP) serial# [3539020538630797472] Jan 23 02:00:31 localhost rhsm-service[6576]: Added (new) Jan 23 02:00:31 localhost rhsm-service[6576]: [sn:3539020538630797472 ( Content Access,) @ /etc/pki/entitlement/3539020538630797472.pem] Jan 23 02:00:31 localhost rhsm-service[6576]: Deleted (rogue): Jan 23 02:00:31 localhost rhsm-service[6576]: Jan 23 02:00:31 localhost subscription-manager[6576]: Added subscription for 'Content Access' contract 'None' Jan 23 02:00:31 localhost subscription-manager[6576]: Added subscription for product ' Content Access' Jan 23 02:00:39 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:169] Could not import locale for C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:39 localhost rhsm-service[6576]: INFO [subscription_manager.i18n:139] Could not import locale either for C_C: [Errno 2] No translation file found for domain: 'rhsm' Jan 23 02:00:39 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:40 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:41 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:41 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:42 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:00:50 localhost python3[6667]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-520e-60b7-00000000000d-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:01:01 localhost python3[6701]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:01:31 localhost setsebool[6776]: The virt_use_nfs policy boolean was changed to 1 by root Jan 23 02:01:31 localhost setsebool[6776]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Jan 23 02:01:41 localhost kernel: SELinux: Converting 408 SID table entries... Jan 23 02:01:41 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:01:41 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:01:41 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:01:53 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=3 res=1 Jan 23 02:01:53 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:01:53 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:01:53 localhost systemd[1]: Reloading. Jan 23 02:01:53 localhost systemd-rc-local-generator[7640]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:01:53 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:01:53 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:01:55 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:02:02 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:02:02 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:02:02 localhost systemd[1]: man-db-cache-update.service: Consumed 10.443s CPU time. Jan 23 02:02:02 localhost systemd[1]: run-rede970090edb4bcdb13f25a3b162292f.service: Deactivated successfully. Jan 23 02:02:45 localhost sshd[18353]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:02:48 localhost systemd[1]: var-lib-containers-storage-overlay-compat1151767364-merged.mount: Deactivated successfully. Jan 23 02:02:48 localhost podman[18370]: 2026-01-23 07:02:48.588563419 +0000 UTC m=+0.097990057 system refresh Jan 23 02:02:49 localhost systemd[4175]: Starting D-Bus User Message Bus... Jan 23 02:02:49 localhost dbus-broker-launch[18428]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Jan 23 02:02:49 localhost dbus-broker-launch[18428]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Jan 23 02:02:49 localhost systemd[4175]: Started D-Bus User Message Bus. Jan 23 02:02:49 localhost journal[18428]: Ready Jan 23 02:02:49 localhost systemd[4175]: selinux: avc: op=load_policy lsm=selinux seqno=3 res=1 Jan 23 02:02:49 localhost systemd[4175]: Created slice Slice /user. Jan 23 02:02:49 localhost systemd[4175]: podman-18411.scope: unit configures an IP firewall, but not running as root. Jan 23 02:02:49 localhost systemd[4175]: (This warning is only shown for the first unit using IP firewalling.) Jan 23 02:02:49 localhost systemd[4175]: Started podman-18411.scope. Jan 23 02:02:49 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 02:02:49 localhost systemd[4175]: Started podman-pause-61dbcc92.scope. Jan 23 02:02:52 localhost systemd[1]: session-6.scope: Deactivated successfully. Jan 23 02:02:52 localhost systemd[1]: session-6.scope: Consumed 51.354s CPU time. Jan 23 02:02:52 localhost systemd-logind[762]: Session 6 logged out. Waiting for processes to exit. Jan 23 02:02:52 localhost systemd-logind[762]: Removed session 6. Jan 23 02:03:07 localhost sshd[18432]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18434]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18435]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18433]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:07 localhost sshd[18431]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:14 localhost sshd[18441]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:03:14 localhost systemd-logind[762]: New session 7 of user zuul. Jan 23 02:03:14 localhost systemd[1]: Started Session 7 of User zuul. Jan 23 02:03:14 localhost python3[18458]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBInV8xbfwZCtixFfnaF+5335WSj2PPYn9+xcf0/XxAeXNy37BWyB6Z08AP77XEzDpqv4jTzIwdAdQ5f/jZPqrA= zuul@np0005593098.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:03:15 localhost python3[18474]: ansible-ansible.posix.authorized_key Invoked with user=root key=ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBBInV8xbfwZCtixFfnaF+5335WSj2PPYn9+xcf0/XxAeXNy37BWyB6Z08AP77XEzDpqv4jTzIwdAdQ5f/jZPqrA= zuul@np0005593098.novalocal#012 manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:03:18 localhost systemd[1]: session-7.scope: Deactivated successfully. Jan 23 02:03:18 localhost systemd-logind[762]: Session 7 logged out. Waiting for processes to exit. Jan 23 02:03:18 localhost systemd-logind[762]: Removed session 7. Jan 23 02:04:46 localhost sshd[18477]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:04:47 localhost systemd-logind[762]: New session 8 of user zuul. Jan 23 02:04:47 localhost systemd[1]: Started Session 8 of User zuul. Jan 23 02:04:47 localhost python3[18496]: ansible-authorized_key Invoked with user=root manage_dir=True key=ssh-rsa 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 zuul-build-sshkey state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:04:48 localhost python3[18512]: ansible-user Invoked with name=root state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593101.novalocal update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 02:04:49 localhost python3[18562]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:49 localhost python3[18605]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769151889.114453-89-18363650915136/source dest=/root/.ssh/id_rsa mode=384 owner=root force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa follow=False checksum=332ac6e5e102fad0efb63e7711468addf4cebb64 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:51 localhost python3[18667]: ansible-ansible.legacy.stat Invoked with path=/root/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:51 localhost python3[18710]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769151891.0471427-180-247085720979842/source dest=/root/.ssh/id_rsa.pub mode=420 owner=root force=False _original_basename=f0ca803688374c26b4694015756da1b7_id_rsa.pub follow=False checksum=a2dfb4df29ea2fda7d7e4b28a63ca08610edd25d backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:54 localhost python3[18740]: ansible-ansible.builtin.file Invoked with path=/etc/nodepool state=directory mode=0777 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:55 localhost python3[18786]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:55 localhost python3[18802]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes _original_basename=tmpw2i7sih5 recurse=False state=file path=/etc/nodepool/sub_nodes force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:56 localhost python3[18862]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/sub_nodes_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:56 localhost python3[18878]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/sub_nodes_private _original_basename=tmpqzqgyflq recurse=False state=file path=/etc/nodepool/sub_nodes_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:58 localhost python3[18938]: ansible-ansible.legacy.stat Invoked with path=/etc/nodepool/node_private follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:04:58 localhost python3[18954]: ansible-ansible.legacy.file Invoked with dest=/etc/nodepool/node_private _original_basename=tmp5vrc_w1w recurse=False state=file path=/etc/nodepool/node_private force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:04:59 localhost systemd[1]: session-8.scope: Deactivated successfully. Jan 23 02:04:59 localhost systemd[1]: session-8.scope: Consumed 3.468s CPU time. Jan 23 02:04:59 localhost systemd-logind[762]: Session 8 logged out. Waiting for processes to exit. Jan 23 02:04:59 localhost systemd-logind[762]: Removed session 8. Jan 23 02:05:26 localhost sshd[18969]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:07:16 localhost sshd[18971]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:07:16 localhost systemd-logind[762]: New session 9 of user zuul. Jan 23 02:07:16 localhost systemd[1]: Started Session 9 of User zuul. Jan 23 02:07:17 localhost python3[19017]: ansible-ansible.legacy.command Invoked with _raw_params=hostname _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:07:41 localhost sshd[19019]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:11:05 localhost sshd[19020]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:11:05 localhost systemd[1]: Starting dnf makecache... Jan 23 02:11:05 localhost dnf[19021]: Updating Subscription Management repositories. Jan 23 02:11:07 localhost dnf[19021]: Failed determining last makecache time. Jan 23 02:11:07 localhost dnf[19021]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 38 kB/s | 4.5 kB 00:00 Jan 23 02:11:07 localhost dnf[19021]: Red Hat Enterprise Linux 9 for x86_64 - AppStre 52 kB/s | 4.5 kB 00:00 Jan 23 02:11:07 localhost dnf[19021]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 49 kB/s | 4.1 kB 00:00 Jan 23 02:11:07 localhost dnf[19021]: Red Hat Enterprise Linux 9 for x86_64 - BaseOS 39 kB/s | 4.1 kB 00:00 Jan 23 02:11:08 localhost dnf[19021]: Metadata cache created. Jan 23 02:11:08 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Jan 23 02:11:08 localhost systemd[1]: Finished dnf makecache. Jan 23 02:11:08 localhost systemd[1]: dnf-makecache.service: Consumed 2.633s CPU time. Jan 23 02:11:11 localhost sshd[19027]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:11:54 localhost sshd[19029]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:12:16 localhost systemd[1]: session-9.scope: Deactivated successfully. Jan 23 02:12:16 localhost systemd-logind[762]: Session 9 logged out. Waiting for processes to exit. Jan 23 02:12:16 localhost systemd-logind[762]: Removed session 9. Jan 23 02:13:19 localhost sshd[19035]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:14:06 localhost sshd[19038]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:16:22 localhost sshd[19040]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:18:30 localhost sshd[19043]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:19:08 localhost sshd[19047]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:19:09 localhost systemd-logind[762]: New session 10 of user zuul. Jan 23 02:19:09 localhost systemd[1]: Started Session 10 of User zuul. Jan 23 02:19:09 localhost python3[19064]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/redhat-release zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000000c-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:19:10 localhost python3[19084]: ansible-ansible.legacy.command Invoked with _raw_params=yum clean all zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000000d-1-overcloudcontroller0 zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:19:15 localhost python3[19103]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-baseos-eus-rpms'] state=enabled purge=False Jan 23 02:19:19 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:19:19 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:12 localhost python3[19262]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-appstream-eus-rpms'] state=enabled purge=False Jan 23 02:20:14 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:14 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:22 localhost python3[19403]: ansible-community.general.rhsm_repository Invoked with name=['rhel-9-for-x86_64-highavailability-eus-rpms'] state=enabled purge=False Jan 23 02:20:25 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:29 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:29 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:35 localhost sshd[19722]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:20:50 localhost python3[19739]: ansible-community.general.rhsm_repository Invoked with name=['fast-datapath-for-rhel-9-x86_64-rpms'] state=enabled purge=False Jan 23 02:20:53 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:53 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:58 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:20:58 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:20 localhost python3[20075]: ansible-community.general.rhsm_repository Invoked with name=['openstack-17.1-for-rhel-9-x86_64-rpms'] state=enabled purge=False Jan 23 02:21:22 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:22 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:27 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:27 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:21:49 localhost python3[20354]: ansible-ansible.legacy.command Invoked with _raw_params=yum repolist --enabled#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000013-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:21:55 localhost python3[20373]: ansible-ansible.legacy.dnf Invoked with name=['openvswitch', 'os-net-config', 'ansible-core'] state=present update_cache=True allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:22:14 localhost kernel: SELinux: Converting 490 SID table entries... Jan 23 02:22:14 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:22:14 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:22:14 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:22:16 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=4 res=1 Jan 23 02:22:16 localhost systemd[1]: Started daily update of the root trust anchor for DNSSEC. Jan 23 02:22:18 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:22:18 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:22:18 localhost systemd[1]: Reloading. Jan 23 02:22:18 localhost systemd-sysv-generator[21038]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:22:18 localhost systemd-rc-local-generator[21033]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:22:19 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:22:19 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:22:20 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:22:20 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:22:20 localhost systemd[1]: run-rd1b20a85ffa54cc3aa214b817f8efc5f.service: Deactivated successfully. Jan 23 02:22:20 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:22:20 localhost rhsm-service[6576]: WARNING [subscription_manager.cert_sorter:194] Installed product 479 not present in response from server. Jan 23 02:22:44 localhost sshd[21565]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:22:47 localhost python3[21583]: ansible-ansible.legacy.command Invoked with _raw_params=ansible-galaxy collection install ansible.posix#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000015-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:23:15 localhost python3[21603]: ansible-ansible.builtin.file Invoked with path=/etc/os-net-config state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:23:15 localhost python3[21651]: ansible-ansible.legacy.stat Invoked with path=/etc/os-net-config/tripleo_config.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:23:16 localhost python3[21694]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769152995.5600793-286-127508041526178/source dest=/etc/os-net-config/tripleo_config.yaml mode=None follow=False _original_basename=overcloud_net_config.j2 checksum=4997906c68798c344e568ee48e178d8dbd720a7a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:23:17 localhost python3[21724]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:17 localhost systemd-journald[618]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 89.2 (297 of 333 items), suggesting rotation. Jan 23 02:23:17 localhost systemd-journald[618]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 02:23:17 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:23:17 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:23:18 localhost python3[21745]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-20 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:18 localhost python3[21765]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-21 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:18 localhost python3[21785]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-22 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:19 localhost python3[21805]: ansible-community.general.nmcli Invoked with conn_name=ci-private-network-23 state=absent ignore_unsupported_suboptions=False autoconnect=True gw4_ignore_auto=False never_default4=False dns4_ignore_auto=False may_fail4=True gw6_ignore_auto=False dns6_ignore_auto=False mode=balance-rr stp=True priority=128 slavepriority=32 forwarddelay=15 hellotime=2 maxage=20 ageingtime=300 hairpin=False path_cost=100 runner=roundrobin master=None slave_type=None ifname=None type=None ip4=None gw4=None routes4=None routes4_extended=None route_metric4=None routing_rules4=None dns4=None dns4_search=None dns4_options=None method4=None dhcp_client_id=None ip6=None gw6=None dns6=None dns6_search=None dns6_options=None routes6=None routes6_extended=None route_metric6=None method6=None ip_privacy6=None addr_gen_mode6=None miimon=None downdelay=None updelay=None xmit_hash_policy=None arp_interval=None arp_ip_target=None primary=None mtu=None mac=None zone=None runner_hwaddr_policy=None runner_fast_rate=None vlanid=None vlandev=None flags=None ingress=None egress=None vxlan_id=None vxlan_local=None vxlan_remote=None ip_tunnel_dev=None ip_tunnel_local=None ip_tunnel_remote=None ip_tunnel_input_key=NOT_LOGGING_PARAMETER ip_tunnel_output_key=NOT_LOGGING_PARAMETER ssid=None wifi=None wifi_sec=NOT_LOGGING_PARAMETER gsm=None macvlan=None wireguard=None vpn=None transport_mode=None Jan 23 02:23:21 localhost python3[21825]: ansible-ansible.builtin.systemd Invoked with name=network state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:23:21 localhost systemd[1]: Starting LSB: Bring up/down networking... Jan 23 02:23:21 localhost network[21828]: WARN : [network] You are using 'network' service provided by 'network-scripts', which are now deprecated. Jan 23 02:23:21 localhost network[21839]: You are using 'network' service provided by 'network-scripts', which are now deprecated. Jan 23 02:23:21 localhost network[21828]: WARN : [network] 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:21 localhost network[21840]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:21 localhost network[21828]: WARN : [network] It is advised to switch to 'NetworkManager' instead for network management. Jan 23 02:23:21 localhost network[21841]: It is advised to switch to 'NetworkManager' instead for network management. Jan 23 02:23:21 localhost NetworkManager[5961]: [1769153001.4019] audit: op="connections-reload" pid=21869 uid=0 result="success" Jan 23 02:23:21 localhost network[21828]: Bringing up loopback interface: [ OK ] Jan 23 02:23:21 localhost NetworkManager[5961]: [1769153001.6105] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth0" pid=21957 uid=0 result="success" Jan 23 02:23:21 localhost network[21828]: Bringing up interface eth0: [ OK ] Jan 23 02:23:21 localhost systemd[1]: Started LSB: Bring up/down networking. Jan 23 02:23:22 localhost python3[21998]: ansible-ansible.builtin.systemd Invoked with name=openvswitch state=started daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Database Unit... Jan 23 02:23:22 localhost chown[22002]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Jan 23 02:23:22 localhost ovs-ctl[22007]: /etc/openvswitch/conf.db does not exist ... (warning). Jan 23 02:23:22 localhost ovs-ctl[22007]: Creating empty database /etc/openvswitch/conf.db [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22007]: Starting ovsdb-server [ OK ] Jan 23 02:23:22 localhost ovs-vsctl[22056]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Jan 23 02:23:22 localhost ovs-vsctl[22076]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.6-141.el9fdp "external-ids:system-id=\"f438d1c8-35d7-42c0-bd8c-3e44af45c774\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"rhel\"" "system-version=\"9.2\"" Jan 23 02:23:22 localhost ovs-ctl[22007]: Configuring Open vSwitch system IDs [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22007]: Enabling remote OVSDB managers [ OK ] Jan 23 02:23:22 localhost ovs-vsctl[22082]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005593101.novalocal Jan 23 02:23:22 localhost systemd[1]: Started Open vSwitch Database Unit. Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Delete Transient Ports... Jan 23 02:23:22 localhost systemd[1]: Finished Open vSwitch Delete Transient Ports. Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch Forwarding Unit... Jan 23 02:23:22 localhost kernel: openvswitch: Open vSwitch switching datapath Jan 23 02:23:22 localhost ovs-ctl[22127]: Inserting openvswitch module [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22095]: Starting ovs-vswitchd [ OK ] Jan 23 02:23:22 localhost ovs-ctl[22095]: Enabling remote OVSDB managers [ OK ] Jan 23 02:23:22 localhost ovs-vsctl[22145]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005593101.novalocal Jan 23 02:23:22 localhost systemd[1]: Started Open vSwitch Forwarding Unit. Jan 23 02:23:22 localhost systemd[1]: Starting Open vSwitch... Jan 23 02:23:22 localhost systemd[1]: Finished Open vSwitch. Jan 23 02:23:25 localhost python3[22164]: ansible-ansible.legacy.command Invoked with _raw_params=os-net-config -c /etc/os-net-config/tripleo_config.yaml#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000001a-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:23:26 localhost NetworkManager[5961]: [1769153006.8970] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22322 uid=0 result="success" Jan 23 02:23:26 localhost ifup[22323]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:26 localhost ifup[22324]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:26 localhost ifup[22325]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:26 localhost NetworkManager[5961]: [1769153006.9283] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22331 uid=0 result="success" Jan 23 02:23:26 localhost ovs-vsctl[22333]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex other-config:mac-table-size=50000 -- set bridge br-ex other-config:hwaddr=fa:16:3e:26:37:85 -- set bridge br-ex fail_mode=standalone -- del-controller br-ex Jan 23 02:23:26 localhost NetworkManager[5961]: [1769153006.9567] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Jan 23 02:23:26 localhost kernel: device ovs-system entered promiscuous mode Jan 23 02:23:26 localhost kernel: Timeout policy base is empty Jan 23 02:23:26 localhost kernel: Failed to associated timeout policy `ovs_test_tp' Jan 23 02:23:26 localhost systemd-udevd[22335]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:26 localhost kernel: device br-ex entered promiscuous mode Jan 23 02:23:26 localhost systemd-udevd[22351]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:26 localhost NetworkManager[5961]: [1769153006.9844] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/5) Jan 23 02:23:27 localhost NetworkManager[5961]: [1769153007.0052] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22361 uid=0 result="success" Jan 23 02:23:27 localhost NetworkManager[5961]: [1769153007.0223] device (br-ex): carrier: link connected Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.0766] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22390 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.1275] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22405 uid=0 result="success" Jan 23 02:23:30 localhost NET[22430]: /etc/sysconfig/network-scripts/ifup-post : updated /etc/resolv.conf Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.2169] device (eth1): state change: activated -> unmanaged (reason 'unmanaged', sys-iface-state: 'managed') Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.2279] dhcp4 (eth1): canceled DHCP transaction Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.2280] dhcp4 (eth1): activation: beginning transaction (timeout in 45 seconds) Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.2280] dhcp4 (eth1): state changed no lease Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.2317] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22439 uid=0 result="success" Jan 23 02:23:30 localhost ifup[22440]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:30 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 02:23:30 localhost ifup[22441]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:30 localhost ifup[22443]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:30 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.2739] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22457 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.3205] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22467 uid=0 result="success" Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.3275] device (eth1): carrier: link connected Jan 23 02:23:30 localhost NetworkManager[5961]: [1769153010.3503] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22476 uid=0 result="success" Jan 23 02:23:30 localhost ipv6_wait_tentative[22488]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Jan 23 02:23:31 localhost ipv6_wait_tentative[22493]: Waiting for interface eth1 IPv6 address(es) to leave the 'tentative' state Jan 23 02:23:32 localhost NetworkManager[5961]: [1769153012.4196] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-eth1" pid=22502 uid=0 result="success" Jan 23 02:23:32 localhost ovs-vsctl[22517]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex eth1 -- add-port br-ex eth1 Jan 23 02:23:32 localhost kernel: device eth1 entered promiscuous mode Jan 23 02:23:32 localhost NetworkManager[5961]: [1769153012.4846] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22525 uid=0 result="success" Jan 23 02:23:32 localhost ifup[22526]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:32 localhost ifup[22527]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:32 localhost ifup[22528]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:32 localhost NetworkManager[5961]: [1769153012.5163] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=22534 uid=0 result="success" Jan 23 02:23:32 localhost NetworkManager[5961]: [1769153012.5576] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22544 uid=0 result="success" Jan 23 02:23:32 localhost ifup[22545]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:32 localhost ifup[22546]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:32 localhost ifup[22547]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:32 localhost NetworkManager[5961]: [1769153012.5866] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22553 uid=0 result="success" Jan 23 02:23:32 localhost ovs-vsctl[22556]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Jan 23 02:23:32 localhost kernel: device vlan23 entered promiscuous mode Jan 23 02:23:32 localhost NetworkManager[5961]: [1769153012.6259] manager: (vlan23): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Jan 23 02:23:32 localhost systemd-udevd[22558]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:32 localhost NetworkManager[5961]: [1769153012.6536] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22567 uid=0 result="success" Jan 23 02:23:32 localhost NetworkManager[5961]: [1769153012.6725] device (vlan23): carrier: link connected Jan 23 02:23:35 localhost NetworkManager[5961]: [1769153015.7321] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22596 uid=0 result="success" Jan 23 02:23:35 localhost NetworkManager[5961]: [1769153015.7827] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=22611 uid=0 result="success" Jan 23 02:23:35 localhost NetworkManager[5961]: [1769153015.8421] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22632 uid=0 result="success" Jan 23 02:23:35 localhost ifup[22633]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:35 localhost ifup[22634]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:35 localhost ifup[22635]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:35 localhost NetworkManager[5961]: [1769153015.8709] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22641 uid=0 result="success" Jan 23 02:23:35 localhost ovs-vsctl[22644]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Jan 23 02:23:35 localhost kernel: device vlan22 entered promiscuous mode Jan 23 02:23:35 localhost NetworkManager[5961]: [1769153015.9093] manager: (vlan22): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Jan 23 02:23:35 localhost systemd-udevd[22646]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:35 localhost NetworkManager[5961]: [1769153015.9314] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22656 uid=0 result="success" Jan 23 02:23:35 localhost NetworkManager[5961]: [1769153015.9508] device (vlan22): carrier: link connected Jan 23 02:23:39 localhost NetworkManager[5961]: [1769153019.0331] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22686 uid=0 result="success" Jan 23 02:23:39 localhost NetworkManager[5961]: [1769153019.0850] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=22701 uid=0 result="success" Jan 23 02:23:39 localhost NetworkManager[5961]: [1769153019.1476] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22722 uid=0 result="success" Jan 23 02:23:39 localhost ifup[22723]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:39 localhost ifup[22724]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:39 localhost ifup[22725]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:39 localhost NetworkManager[5961]: [1769153019.1748] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22731 uid=0 result="success" Jan 23 02:23:39 localhost ovs-vsctl[22734]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Jan 23 02:23:39 localhost systemd-udevd[22736]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:39 localhost kernel: device vlan44 entered promiscuous mode Jan 23 02:23:39 localhost NetworkManager[5961]: [1769153019.2136] manager: (vlan44): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Jan 23 02:23:39 localhost NetworkManager[5961]: [1769153019.2353] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22746 uid=0 result="success" Jan 23 02:23:39 localhost NetworkManager[5961]: [1769153019.2549] device (vlan44): carrier: link connected Jan 23 02:23:40 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 02:23:42 localhost NetworkManager[5961]: [1769153022.3034] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22776 uid=0 result="success" Jan 23 02:23:42 localhost NetworkManager[5961]: [1769153022.3406] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22791 uid=0 result="success" Jan 23 02:23:42 localhost NetworkManager[5961]: [1769153022.3938] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22812 uid=0 result="success" Jan 23 02:23:42 localhost ifup[22813]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:42 localhost ifup[22814]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:42 localhost ifup[22815]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:42 localhost NetworkManager[5961]: [1769153022.4250] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22821 uid=0 result="success" Jan 23 02:23:42 localhost ovs-vsctl[22824]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Jan 23 02:23:42 localhost kernel: device vlan20 entered promiscuous mode Jan 23 02:23:42 localhost NetworkManager[5961]: [1769153022.5062] manager: (vlan20): new Generic device (/org/freedesktop/NetworkManager/Devices/9) Jan 23 02:23:42 localhost systemd-udevd[22826]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:42 localhost NetworkManager[5961]: [1769153022.5314] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22836 uid=0 result="success" Jan 23 02:23:42 localhost NetworkManager[5961]: [1769153022.5507] device (vlan20): carrier: link connected Jan 23 02:23:45 localhost NetworkManager[5961]: [1769153025.5999] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22866 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5961]: [1769153025.6443] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=22881 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5961]: [1769153025.7002] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22902 uid=0 result="success" Jan 23 02:23:45 localhost ifup[22903]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:45 localhost ifup[22904]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:45 localhost ifup[22905]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:45 localhost NetworkManager[5961]: [1769153025.7314] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22911 uid=0 result="success" Jan 23 02:23:45 localhost ovs-vsctl[22914]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Jan 23 02:23:45 localhost kernel: device vlan21 entered promiscuous mode Jan 23 02:23:45 localhost NetworkManager[5961]: [1769153025.7709] manager: (vlan21): new Generic device (/org/freedesktop/NetworkManager/Devices/10) Jan 23 02:23:45 localhost systemd-udevd[22917]: Network interface NamePolicy= disabled on kernel command line. Jan 23 02:23:45 localhost NetworkManager[5961]: [1769153025.7967] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22926 uid=0 result="success" Jan 23 02:23:45 localhost NetworkManager[5961]: [1769153025.8156] device (vlan21): carrier: link connected Jan 23 02:23:48 localhost NetworkManager[5961]: [1769153028.8648] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22956 uid=0 result="success" Jan 23 02:23:48 localhost NetworkManager[5961]: [1769153028.9113] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=22971 uid=0 result="success" Jan 23 02:23:48 localhost NetworkManager[5961]: [1769153028.9656] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=22992 uid=0 result="success" Jan 23 02:23:48 localhost ifup[22993]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:48 localhost ifup[22994]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:48 localhost ifup[22995]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:48 localhost NetworkManager[5961]: [1769153028.9976] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23001 uid=0 result="success" Jan 23 02:23:49 localhost ovs-vsctl[23004]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan44 -- add-port br-ex vlan44 tag=44 -- set Interface vlan44 type=internal Jan 23 02:23:49 localhost NetworkManager[5961]: [1769153029.0573] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23011 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5961]: [1769153030.1194] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23038 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5961]: [1769153030.1616] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan44" pid=23053 uid=0 result="success" Jan 23 02:23:50 localhost NetworkManager[5961]: [1769153030.2214] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23074 uid=0 result="success" Jan 23 02:23:50 localhost ifup[23075]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:50 localhost ifup[23076]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:50 localhost ifup[23077]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:50 localhost NetworkManager[5961]: [1769153030.2533] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23083 uid=0 result="success" Jan 23 02:23:50 localhost ovs-vsctl[23086]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan20 -- add-port br-ex vlan20 tag=20 -- set Interface vlan20 type=internal Jan 23 02:23:50 localhost NetworkManager[5961]: [1769153030.3137] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23093 uid=0 result="success" Jan 23 02:23:51 localhost NetworkManager[5961]: [1769153031.3754] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23121 uid=0 result="success" Jan 23 02:23:51 localhost NetworkManager[5961]: [1769153031.4234] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan20" pid=23136 uid=0 result="success" Jan 23 02:23:51 localhost NetworkManager[5961]: [1769153031.4855] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23157 uid=0 result="success" Jan 23 02:23:51 localhost ifup[23158]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:51 localhost ifup[23159]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:51 localhost ifup[23160]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:51 localhost NetworkManager[5961]: [1769153031.5161] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23166 uid=0 result="success" Jan 23 02:23:51 localhost ovs-vsctl[23169]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan21 -- add-port br-ex vlan21 tag=21 -- set Interface vlan21 type=internal Jan 23 02:23:51 localhost NetworkManager[5961]: [1769153031.5722] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23176 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5961]: [1769153032.6751] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23204 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5961]: [1769153032.7210] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan21" pid=23219 uid=0 result="success" Jan 23 02:23:52 localhost NetworkManager[5961]: [1769153032.7704] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23240 uid=0 result="success" Jan 23 02:23:52 localhost ifup[23241]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:52 localhost ifup[23242]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:52 localhost ifup[23243]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:52 localhost NetworkManager[5961]: [1769153032.7983] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23249 uid=0 result="success" Jan 23 02:23:52 localhost ovs-vsctl[23252]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan23 -- add-port br-ex vlan23 tag=23 -- set Interface vlan23 type=internal Jan 23 02:23:52 localhost NetworkManager[5961]: [1769153032.8357] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23259 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5961]: [1769153033.8827] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23287 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5961]: [1769153033.9301] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan23" pid=23302 uid=0 result="success" Jan 23 02:23:53 localhost NetworkManager[5961]: [1769153033.9879] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23323 uid=0 result="success" Jan 23 02:23:53 localhost ifup[23324]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Jan 23 02:23:53 localhost ifup[23325]: 'network-scripts' will be removed from distribution in near future. Jan 23 02:23:53 localhost ifup[23326]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Jan 23 02:23:54 localhost NetworkManager[5961]: [1769153034.0129] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23332 uid=0 result="success" Jan 23 02:23:54 localhost ovs-vsctl[23335]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex vlan22 -- add-port br-ex vlan22 tag=22 -- set Interface vlan22 type=internal Jan 23 02:23:54 localhost NetworkManager[5961]: [1769153034.0652] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23342 uid=0 result="success" Jan 23 02:23:55 localhost NetworkManager[5961]: [1769153035.1195] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23370 uid=0 result="success" Jan 23 02:23:55 localhost NetworkManager[5961]: [1769153035.1670] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-vlan22" pid=23385 uid=0 result="success" Jan 23 02:24:48 localhost python3[23417]: ansible-ansible.legacy.command Invoked with _raw_params=ip a#012ping -c 2 -W 2 192.168.122.10#012ping -c 2 -W 2 192.168.122.11#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-00000000001b-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:53 localhost python3[23436]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDA22S1/hH+74ZumLmJ/jHPUBPUomvGp3s6RqnOgAdA7cefJomWVOgkqwlIoxK5FTcArrD88mi9sN+lvzN/kGGPgykDsWzPpE9b4way9UPOaDSLS04NNjNF7tr+BuHrN6LIUkYCWLs3icRmrwYU2v6dkBelWRDqyHXucSgfvBPJxUU9/01SjH0DQu0XkkKS+xqKi8AcUdmj7ZW/5Ep/v7R8xdZNDwvG67wt0sgMSmVqVP0qfeU8Yi0cLZ65R1eMSD8dwMfsDi/s5qP/FALaWGZZlTqzronkoY3LH5RIbNnqGd28182cfxXDod4kAS2vbyzUYyYdRja0QCp29mgD4AV8WO4HYj5hJ4CrXz1UfDeBqsOKxEzgD8An+1jSdyh39tjsSCMG4j2Zp6s4SjmkEKix1MXqp7578FrwHzVM4K9kOXf1xqlzHLv/dLdfPIw2EOHM/kyCHdHKDVUaH1DFVBF0ZyrN57RFJvEoiw3RgfyDhzZK6hIMyNXDqGQ45hLVjOE= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:54 localhost python3[23452]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:56 localhost python3[23466]: ansible-ansible.posix.authorized_key Invoked with user=zuul key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDA22S1/hH+74ZumLmJ/jHPUBPUomvGp3s6RqnOgAdA7cefJomWVOgkqwlIoxK5FTcArrD88mi9sN+lvzN/kGGPgykDsWzPpE9b4way9UPOaDSLS04NNjNF7tr+BuHrN6LIUkYCWLs3icRmrwYU2v6dkBelWRDqyHXucSgfvBPJxUU9/01SjH0DQu0XkkKS+xqKi8AcUdmj7ZW/5Ep/v7R8xdZNDwvG67wt0sgMSmVqVP0qfeU8Yi0cLZ65R1eMSD8dwMfsDi/s5qP/FALaWGZZlTqzronkoY3LH5RIbNnqGd28182cfxXDod4kAS2vbyzUYyYdRja0QCp29mgD4AV8WO4HYj5hJ4CrXz1UfDeBqsOKxEzgD8An+1jSdyh39tjsSCMG4j2Zp6s4SjmkEKix1MXqp7578FrwHzVM4K9kOXf1xqlzHLv/dLdfPIw2EOHM/kyCHdHKDVUaH1DFVBF0ZyrN57RFJvEoiw3RgfyDhzZK6hIMyNXDqGQ45hLVjOE= zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:56 localhost python3[23482]: ansible-ansible.posix.authorized_key Invoked with user=root key=ssh-rsa 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 zuul-build-sshkey manage_dir=True state=present exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Jan 23 02:24:57 localhost python3[23496]: ansible-ansible.builtin.slurp Invoked with path=/etc/hostname src=/etc/hostname Jan 23 02:24:58 localhost python3[23511]: ansible-ansible.legacy.command Invoked with _raw_params=hostname="np0005593101.novalocal"#012hostname_str_array=(${hostname//./ })#012echo ${hostname_str_array[0]} > /home/zuul/ansible_hostname#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000022-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:58 localhost python3[23531]: ansible-ansible.legacy.command Invoked with _raw_params=hostname=$(cat /home/zuul/ansible_hostname)#012hostnamectl hostname "$hostname.ooo.test"#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-a47b-06b4-000000000023-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:24:58 localhost systemd[1]: Starting Hostname Service... Jan 23 02:24:58 localhost systemd[1]: Started Hostname Service. Jan 23 02:24:58 localhost systemd-hostnamed[23535]: Hostname set to (static) Jan 23 02:24:58 localhost NetworkManager[5961]: [1769153098.9897] hostname: static hostname changed from "np0005593101.novalocal" to "np0005593101.ooo.test" Jan 23 02:24:58 localhost systemd[1]: Starting Network Manager Script Dispatcher Service... Jan 23 02:24:59 localhost systemd[1]: Started Network Manager Script Dispatcher Service. Jan 23 02:25:00 localhost systemd[1]: session-10.scope: Deactivated successfully. Jan 23 02:25:00 localhost systemd[1]: session-10.scope: Consumed 1min 44.614s CPU time. Jan 23 02:25:00 localhost systemd-logind[762]: Session 10 logged out. Waiting for processes to exit. Jan 23 02:25:00 localhost systemd-logind[762]: Removed session 10. Jan 23 02:25:01 localhost sshd[23546]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:25:01 localhost systemd-logind[762]: New session 11 of user zuul. Jan 23 02:25:01 localhost systemd[1]: Started Session 11 of User zuul. Jan 23 02:25:01 localhost python3[23563]: ansible-ansible.builtin.slurp Invoked with path=/home/zuul/ansible_hostname src=/home/zuul/ansible_hostname Jan 23 02:25:05 localhost systemd[1]: session-11.scope: Deactivated successfully. Jan 23 02:25:05 localhost systemd-logind[762]: Session 11 logged out. Waiting for processes to exit. Jan 23 02:25:05 localhost systemd-logind[762]: Removed session 11. Jan 23 02:25:09 localhost systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Jan 23 02:25:10 localhost sshd[23567]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:25:10 localhost systemd-logind[762]: New session 12 of user zuul. Jan 23 02:25:10 localhost systemd[1]: Started Session 12 of User zuul. Jan 23 02:25:10 localhost python3[23586]: ansible-ansible.legacy.dnf Invoked with name=['ipa-client'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:25:17 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Jan 23 02:25:17 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Jan 23 02:25:17 localhost dbus-broker-launch[18428]: Noticed file-system modification, trigger reload. Jan 23 02:25:17 localhost dbus-broker-launch[18428]: Service file '/usr/share/dbus-1/services/certmonger.service' is not named after the D-Bus name 'org.fedorahosted.certmonger'. Jan 23 02:25:17 localhost dbus-broker-launch[18428]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +31: Eavesdropping is deprecated and ignored Jan 23 02:25:17 localhost dbus-broker-launch[18428]: Policy to allow eavesdropping in /usr/share/dbus-1/session.conf +33: Eavesdropping is deprecated and ignored Jan 23 02:25:17 localhost systemd[1]: Reloading. Jan 23 02:25:17 localhost systemd-rc-local-generator[23683]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:25:17 localhost systemd-sysv-generator[23689]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:25:17 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:25:18 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Jan 23 02:25:27 localhost kernel: SELinux: Converting 540 SID table entries... Jan 23 02:25:27 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:25:27 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:25:27 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:25:27 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:25:27 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:25:27 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:25:27 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:25:28 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=5 res=1 Jan 23 02:25:28 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 02:25:28 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 02:25:28 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 02:25:28 localhost systemd[1]: sshd.service: Consumed 1.416s CPU time. Jan 23 02:25:28 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 02:25:28 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 02:25:28 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:25:28 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:25:28 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 02:25:28 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 02:25:28 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 02:25:28 localhost sshd[23721]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:25:28 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 02:25:29 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 02:25:29 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:25:29 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:25:29 localhost systemd[1]: Reloading. Jan 23 02:25:29 localhost systemd-sysv-generator[24285]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:25:29 localhost systemd-rc-local-generator[24280]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:25:29 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:25:29 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:25:29 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:25:30 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:25:30 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:25:30 localhost systemd[1]: man-db-cache-update.service: Consumed 1.438s CPU time. Jan 23 02:25:30 localhost systemd[1]: run-rcd71c7518f754da890c6a759e9c4596f.service: Deactivated successfully. Jan 23 02:25:30 localhost systemd[1]: run-r8b858822175a4d9a89253b97a903a9cd.service: Deactivated successfully. Jan 23 02:26:30 localhost systemd[1]: session-12.scope: Deactivated successfully. Jan 23 02:26:30 localhost systemd[1]: session-12.scope: Consumed 17.522s CPU time. Jan 23 02:26:30 localhost systemd-logind[762]: Session 12 logged out. Waiting for processes to exit. Jan 23 02:26:30 localhost systemd-logind[762]: Removed session 12. Jan 23 02:27:40 localhost sshd[25688]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:27:40 localhost systemd-logind[762]: New session 13 of user zuul. Jan 23 02:27:40 localhost systemd[1]: Started Session 13 of User zuul. Jan 23 02:27:41 localhost python3[25739]: ansible-ansible.legacy.stat Invoked with path=/etc/resolv.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:27:41 localhost python3[25784]: ansible-ansible.legacy.copy Invoked with src=/home/zuul/.ansible/tmp/ansible-tmp-1769153260.973844-62-266012070632179/source dest=/etc/resolv.conf owner=root group=root mode=420 follow=False _original_basename=ipa_resolv_conf.j2 checksum=edbe9a45130a7ebff5948216d04bc5bb05808e49 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:27:46 localhost python3[25814]: ansible-ansible.legacy.command Invoked with _raw_params=ip route add 10.255.255.25 via 192.168.122.100 dev br-ex _uses_shell=True zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:27:48 localhost python3[25832]: ansible-ansible.builtin.file Invoked with path=/etc/pki/CA state=directory mode=0755 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:28:48 localhost systemd[1]: session-13.scope: Deactivated successfully. Jan 23 02:28:48 localhost systemd[1]: session-13.scope: Consumed 1.079s CPU time. Jan 23 02:28:48 localhost systemd-logind[762]: Session 13 logged out. Waiting for processes to exit. Jan 23 02:28:48 localhost systemd-logind[762]: Removed session 13. Jan 23 02:53:44 localhost sshd[25844]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:55:55 localhost sshd[25846]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:55:56 localhost systemd-logind[762]: New session 14 of user zuul. Jan 23 02:55:56 localhost systemd[1]: Started Session 14 of User zuul. Jan 23 02:55:56 localhost python3[25894]: ansible-ansible.legacy.ping Invoked with data=pong Jan 23 02:55:57 localhost python3[25939]: ansible-setup Invoked with gather_subset=['!facter', '!ohai'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 02:55:57 localhost python3[25959]: ansible-user Invoked with name=tripleo-admin generate_ssh_key=False state=present non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593101.ooo.test update_password=always uid=None group=None groups=None comment=None home=None shell=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 02:55:58 localhost systemd-journald[618]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 76.6 (255 of 333 items), suggesting rotation. Jan 23 02:55:58 localhost systemd-journald[618]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 02:55:58 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:55:58 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 02:55:58 localhost python3[26018]: ansible-ansible.legacy.stat Invoked with path=/etc/sudoers.d/tripleo-admin follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:55:59 localhost python3[26061]: ansible-ansible.legacy.copy Invoked with dest=/etc/sudoers.d/tripleo-admin mode=288 owner=root group=root src=/home/zuul/.ansible/tmp/ansible-tmp-1769154958.3972652-81431-35971605305291/source _original_basename=tmpzqy3u64_ follow=False checksum=b3e7ecdcc699d217c6b083a91b07208207813d93 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:55:59 localhost python3[26091]: ansible-file Invoked with path=/home/tripleo-admin state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:00 localhost python3[26107]: ansible-file Invoked with path=/home/tripleo-admin/.ssh state=directory owner=tripleo-admin group=tripleo-admin mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:00 localhost python3[26123]: ansible-file Invoked with path=/home/tripleo-admin/.ssh/authorized_keys state=touch owner=tripleo-admin group=tripleo-admin mode=384 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:01 localhost python3[26139]: ansible-lineinfile Invoked with path=/home/tripleo-admin/.ssh/authorized_keys line=ssh-rsa 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 zuul-build-sshkey#012 regexp=Generated by TripleO state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:02 localhost python3[26153]: ansible-ping Invoked with data=pong Jan 23 02:56:13 localhost sshd[26155]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:56:13 localhost systemd-logind[762]: New session 15 of user tripleo-admin. Jan 23 02:56:13 localhost systemd[1]: Created slice User Slice of UID 1002. Jan 23 02:56:13 localhost systemd[1]: Starting User Runtime Directory /run/user/1002... Jan 23 02:56:13 localhost systemd[1]: Finished User Runtime Directory /run/user/1002. Jan 23 02:56:13 localhost systemd[1]: Starting User Manager for UID 1002... Jan 23 02:56:13 localhost systemd[26159]: Queued start job for default target Main User Target. Jan 23 02:56:13 localhost systemd[26159]: Created slice User Application Slice. Jan 23 02:56:13 localhost systemd[26159]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 02:56:13 localhost systemd[26159]: Started Daily Cleanup of User's Temporary Directories. Jan 23 02:56:13 localhost systemd[26159]: Reached target Paths. Jan 23 02:56:13 localhost systemd[26159]: Reached target Timers. Jan 23 02:56:13 localhost systemd[26159]: Starting D-Bus User Message Bus Socket... Jan 23 02:56:13 localhost systemd[26159]: Starting Create User's Volatile Files and Directories... Jan 23 02:56:13 localhost systemd[26159]: Finished Create User's Volatile Files and Directories. Jan 23 02:56:13 localhost systemd[26159]: Listening on D-Bus User Message Bus Socket. Jan 23 02:56:13 localhost systemd[26159]: Reached target Sockets. Jan 23 02:56:13 localhost systemd[26159]: Reached target Basic System. Jan 23 02:56:13 localhost systemd[26159]: Reached target Main User Target. Jan 23 02:56:13 localhost systemd[26159]: Startup finished in 107ms. Jan 23 02:56:13 localhost systemd[1]: Started User Manager for UID 1002. Jan 23 02:56:13 localhost systemd[1]: Started Session 15 of User tripleo-admin. Jan 23 02:56:14 localhost python3[26220]: ansible-ansible.legacy.setup Invoked with gather_subset=['!all', 'min'] gather_timeout=45 filter=[] fact_path=/etc/ansible/facts.d Jan 23 02:56:18 localhost python3[26240]: ansible-selinux Invoked with policy=targeted state=enforcing configfile=/etc/selinux/config Jan 23 02:56:19 localhost python3[26256]: ansible-tempfile Invoked with state=file suffix=tmphosts prefix=ansible. path=None Jan 23 02:56:20 localhost python3[26304]: ansible-ansible.legacy.copy Invoked with remote_src=True src=/etc/hosts dest=/tmp/ansible.50a_03dytmphosts mode=preserve backup=False force=True follow=False unsafe_writes=False _original_basename=None content=NOT_LOGGING_PARAMETER validate=None directory_mode=None local_follow=None checksum=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:20 localhost python3[26334]: ansible-blockinfile Invoked with state=absent path=/tmp/ansible.50a_03dytmphosts block= marker=# {mark} marker_begin=HEAT_HOSTS_START - Do not edit manually within this section! marker_end=HEAT_HOSTS_END create=False backup=False unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:21 localhost python3[26350]: ansible-blockinfile Invoked with create=True path=/tmp/ansible.50a_03dytmphosts insertbefore=BOF block=172.17.0.106 np0005593104.ooo.test np0005593104#012172.18.0.106 np0005593104.storage.ooo.test np0005593104.storage#012172.17.0.106 np0005593104.internalapi.ooo.test np0005593104.internalapi#012172.19.0.106 np0005593104.tenant.ooo.test np0005593104.tenant#012192.168.122.106 np0005593104.ctlplane.ooo.test np0005593104.ctlplane#012172.17.0.107 np0005593105.ooo.test np0005593105#012172.18.0.107 np0005593105.storage.ooo.test np0005593105.storage#012172.17.0.107 np0005593105.internalapi.ooo.test np0005593105.internalapi#012172.19.0.107 np0005593105.tenant.ooo.test np0005593105.tenant#012192.168.122.107 np0005593105.ctlplane.ooo.test np0005593105.ctlplane#012172.17.0.108 np0005593106.ooo.test np0005593106#012172.18.0.108 np0005593106.storage.ooo.test np0005593106.storage#012172.17.0.108 np0005593106.internalapi.ooo.test np0005593106.internalapi#012172.19.0.108 np0005593106.tenant.ooo.test np0005593106.tenant#012192.168.122.108 np0005593106.ctlplane.ooo.test np0005593106.ctlplane#012172.17.0.103 np0005593101.ooo.test np0005593101#012172.18.0.103 np0005593101.storage.ooo.test np0005593101.storage#012172.20.0.103 np0005593101.storagemgmt.ooo.test np0005593101.storagemgmt#012172.17.0.103 np0005593101.internalapi.ooo.test np0005593101.internalapi#012172.19.0.103 np0005593101.tenant.ooo.test np0005593101.tenant#012172.21.0.103 np0005593101.external.ooo.test np0005593101.external#012192.168.122.103 np0005593101.ctlplane.ooo.test np0005593101.ctlplane#012172.17.0.104 np0005593102.ooo.test np0005593102#012172.18.0.104 np0005593102.storage.ooo.test np0005593102.storage#012172.20.0.104 np0005593102.storagemgmt.ooo.test np0005593102.storagemgmt#012172.17.0.104 np0005593102.internalapi.ooo.test np0005593102.internalapi#012172.19.0.104 np0005593102.tenant.ooo.test np0005593102.tenant#012172.21.0.104 np0005593102.external.ooo.test np0005593102.external#012192.168.122.104 np0005593102.ctlplane.ooo.test np0005593102.ctlplane#012172.17.0.105 np0005593103.ooo.test np0005593103#012172.18.0.105 np0005593103.storage.ooo.test np0005593103.storage#012172.20.0.105 np0005593103.storagemgmt.ooo.test np0005593103.storagemgmt#012172.17.0.105 np0005593103.internalapi.ooo.test np0005593103.internalapi#012172.19.0.105 np0005593103.tenant.ooo.test np0005593103.tenant#012172.21.0.105 np0005593103.external.ooo.test np0005593103.external#012192.168.122.105 np0005593103.ctlplane.ooo.test np0005593103.ctlplane#012#012192.168.122.100 undercloud.ctlplane.ooo.test undercloud.ctlplane#012192.168.122.99 overcloud.ctlplane.ooo.test#012172.18.0.238 overcloud.storage.ooo.test#012172.20.0.139 overcloud.storagemgmt.ooo.test#012172.17.0.233 overcloud.internalapi.ooo.test#012172.21.0.174 overcloud.ooo.test#012 marker=# {mark} marker_begin=START_HOST_ENTRIES_FOR_STACK: overcloud marker_end=END_HOST_ENTRIES_FOR_STACK: overcloud state=present backup=False unsafe_writes=False insertafter=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:22 localhost python3[26366]: ansible-ansible.legacy.command Invoked with _raw_params=cp "/tmp/ansible.50a_03dytmphosts" "/etc/hosts" _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:22 localhost python3[26383]: ansible-file Invoked with path=/tmp/ansible.50a_03dytmphosts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:56:23 localhost python3[26399]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides rhosp-release _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:24 localhost python3[26416]: ansible-ansible.legacy.dnf Invoked with name=['rhosp-release'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:56:28 localhost python3[26435]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:56:29 localhost python3[26452]: ansible-ansible.legacy.dnf Invoked with name=['driverctl', 'lvm2', 'jq', 'nftables', 'openvswitch', 'openstack-heat-agents', 'openstack-selinux', 'os-net-config', 'python3-libselinux', 'python3-pyyaml', 'puppet-tripleo', 'rsync', 'tmpwatch', 'sysstat', 'iproute-tc'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:56:43 localhost systemd[1]: Reloading. Jan 23 02:56:44 localhost systemd-rc-local-generator[26644]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:44 localhost systemd-sysv-generator[26649]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:44 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:44 localhost systemd[1]: Listening on Device-mapper event daemon FIFOs. Jan 23 02:56:52 localhost systemd[1]: Reloading. Jan 23 02:56:52 localhost systemd-sysv-generator[26722]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:52 localhost systemd-rc-local-generator[26719]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:52 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:52 localhost systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Jan 23 02:56:52 localhost systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Jan 23 02:56:52 localhost systemd[1]: Reloading. Jan 23 02:56:52 localhost systemd-sysv-generator[26764]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:56:52 localhost systemd-rc-local-generator[26760]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:56:52 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:56:52 localhost systemd[1]: Listening on LVM2 poll daemon socket. Jan 23 02:57:41 localhost kernel: SELinux: Converting 2713 SID table entries... Jan 23 02:57:41 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 02:57:41 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 02:57:41 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 02:57:41 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 02:57:41 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 02:57:41 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 02:57:41 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 02:57:41 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=7 res=1 Jan 23 02:57:41 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:57:41 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:57:41 localhost systemd[1]: Reloading. Jan 23 02:57:41 localhost systemd-sysv-generator[27378]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:57:42 localhost systemd-rc-local-generator[27375]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:57:42 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:57:42 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:57:42 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:57:42 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:57:42 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:57:42 localhost systemd[1]: run-r886f99315ae64c27b37d7f3ae5499bf0.service: Deactivated successfully. Jan 23 02:57:42 localhost systemd[1]: run-rd732b3ccfe3d46bda972088987b366be.service: Deactivated successfully. Jan 23 02:57:47 localhost python3[28242]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -V driverctl lvm2 jq nftables openvswitch openstack-heat-agents openstack-selinux os-net-config python3-libselinux python3-pyyaml puppet-tripleo rsync tmpwatch sysstat iproute-tc _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:49 localhost python3[28381]: ansible-ansible.legacy.systemd Invoked with name=openvswitch enabled=True state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 02:57:49 localhost systemd[1]: Reloading. Jan 23 02:57:49 localhost systemd-rc-local-generator[28408]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:57:49 localhost systemd-sysv-generator[28413]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:57:49 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:57:49 localhost python3[28435]: ansible-file Invoked with path=/var/lib/heat-config/tripleo-config-download state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:50 localhost python3[28451]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides openstack-network-scripts _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:51 localhost python3[28468]: ansible-systemd Invoked with name=NetworkManager enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 02:57:51 localhost python3[28486]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=dns value=none backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:51 localhost python3[28504]: ansible-ini_file Invoked with path=/etc/NetworkManager/NetworkManager.conf state=present no_extra_spaces=True section=main option=rc-manager value=unmanaged backup=True exclusive=True allow_no_value=False create=True unsafe_writes=False values=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:52 localhost python3[28522]: ansible-ansible.legacy.systemd Invoked with name=NetworkManager state=reloaded daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 02:57:52 localhost systemd[1]: Reloading Network Manager... Jan 23 02:57:52 localhost NetworkManager[5961]: [1769155072.5592] audit: op="reload" arg="0" pid=28525 uid=0 result="success" Jan 23 02:57:52 localhost NetworkManager[5961]: [1769155072.5602] config: signal: SIGHUP,config-files,values,values-user,no-auto-default,dns-mode,rc-manager (/etc/NetworkManager/NetworkManager.conf (lib: 00-server.conf) (run: 15-carrier-timeout.conf)) Jan 23 02:57:52 localhost NetworkManager[5961]: [1769155072.5603] dns-mgr: init: dns=none,systemd-resolved rc-manager=unmanaged Jan 23 02:57:52 localhost systemd[1]: Reloaded Network Manager. Jan 23 02:57:52 localhost python3[28541]: ansible-ansible.legacy.command Invoked with _raw_params=ln -f -s /usr/share/openstack-puppet/modules/* /etc/puppet/modules/ _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:53 localhost python3[28558]: ansible-stat Invoked with path=/usr/bin/ansible-playbook follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:53 localhost python3[28576]: ansible-stat Invoked with path=/usr/bin/ansible-playbook-3 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:54 localhost python3[28592]: ansible-file Invoked with state=link src=/usr/bin/ansible-playbook path=/usr/bin/ansible-playbook-3 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:55 localhost python3[28608]: ansible-tempfile Invoked with state=file prefix=ansible. suffix= path=None Jan 23 02:57:55 localhost python3[28624]: ansible-stat Invoked with path=/etc/ssh/ssh_known_hosts follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:57:56 localhost python3[28640]: ansible-blockinfile Invoked with path=/tmp/ansible.be30yopq block=[192.168.122.106]*,[np0005593104.ctlplane.ooo.test]*,[172.17.0.106]*,[np0005593104.internalapi.ooo.test]*,[172.18.0.106]*,[np0005593104.storage.ooo.test]*,[172.19.0.106]*,[np0005593104.tenant.ooo.test]*,[np0005593104.ooo.test]*,[np0005593104]* ssh-rsa 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#012[192.168.122.107]*,[np0005593105.ctlplane.ooo.test]*,[172.17.0.107]*,[np0005593105.internalapi.ooo.test]*,[172.18.0.107]*,[np0005593105.storage.ooo.test]*,[172.19.0.107]*,[np0005593105.tenant.ooo.test]*,[np0005593105.ooo.test]*,[np0005593105]* ssh-rsa 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#012[192.168.122.108]*,[np0005593106.ctlplane.ooo.test]*,[172.17.0.108]*,[np0005593106.internalapi.ooo.test]*,[172.18.0.108]*,[np0005593106.storage.ooo.test]*,[172.19.0.108]*,[np0005593106.tenant.ooo.test]*,[np0005593106.ooo.test]*,[np0005593106]* ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC0DH9UTkJ6IzBX5GgGtOSt8Yo9YqFEYWPVhTLkqVidCYiRn22GCafJZowy9EWNyxoIs5SR9hip1qwlAXzZZY8/I7V0TJ/FNfOC4oaviBOfSW3scXE/XxQlaFOpRIz5ppEo5DkSoYapbrlW0usfXYOPKzIQ9zpMqXu3fHYeKibgx8lDBoSL3ReWpfP4zezVKHZc6jZpygFcVDmOmBEx+jZv8HyJW/E4FxygbZx/PkkkA6vbXXAZyoPUqb9GWKIrE1jtqCO79CBInXsG24sURnq8EAY00vuIysjOvjXuBln1pW15nWvbxXcDePH/+F/NU9nIiTi86wfrbWoquCAY8eH2pmXasx0/OkbiUthx2/uXOTEXzFKl2GbgV60fG4NyVEN01ADTWUZUB52yg7iu7o9cyKWtW4IzUx8OD9TBoOSVKVodlxKoYKf7B1di5+PQ5ahRAb3J3cMbGT4CTvq6G64YDzaIaX1qyQyI3t+orJ/mfYrQOj47WwdLXoFZudCzd1s=#012[192.168.122.103]*,[np0005593101.ctlplane.ooo.test]*,[172.21.0.103]*,[np0005593101.external.ooo.test]*,[172.17.0.103]*,[np0005593101.internalapi.ooo.test]*,[172.18.0.103]*,[np0005593101.storage.ooo.test]*,[172.20.0.103]*,[np0005593101.storagemgmt.ooo.test]*,[172.19.0.103]*,[np0005593101.tenant.ooo.test]*,[np0005593101.ooo.test]*,[np0005593101]* ssh-rsa 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#012[192.168.122.104]*,[np0005593102.ctlplane.ooo.test]*,[172.21.0.104]*,[np0005593102.external.ooo.test]*,[172.17.0.104]*,[np0005593102.internalapi.ooo.test]*,[172.18.0.104]*,[np0005593102.storage.ooo.test]*,[172.20.0.104]*,[np0005593102.storagemgmt.ooo.test]*,[172.19.0.104]*,[np0005593102.tenant.ooo.test]*,[np0005593102.ooo.test]*,[np0005593102]* ssh-rsa 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#012[192.168.122.105]*,[np0005593103.ctlplane.ooo.test]*,[172.21.0.105]*,[np0005593103.external.ooo.test]*,[172.17.0.105]*,[np0005593103.internalapi.ooo.test]*,[172.18.0.105]*,[np0005593103.storage.ooo.test]*,[172.20.0.105]*,[np0005593103.storagemgmt.ooo.test]*,[172.19.0.105]*,[np0005593103.tenant.ooo.test]*,[np0005593103.ooo.test]*,[np0005593103]* ssh-rsa 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#012 create=True state=present marker=# {mark} ANSIBLE MANAGED BLOCK backup=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:56 localhost python3[28656]: ansible-ansible.legacy.command Invoked with _raw_params=cat '/tmp/ansible.be30yopq' > /etc/ssh/ssh_known_hosts _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:57 localhost python3[28674]: ansible-file Invoked with path=/tmp/ansible.be30yopq state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:57:57 localhost python3[28690]: ansible-file Invoked with path=/var/log/journal state=directory mode=0750 owner=root group=root setype=var_log_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Jan 23 02:57:58 localhost python3[28706]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active cloud-init.service || systemctl is-enabled cloud-init.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:58 localhost python3[28724]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline | grep -q cloud-init=disabled _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:57:59 localhost python3[28743]: ansible-community.general.cloud_init_data_facts Invoked with filter=status Jan 23 02:58:01 localhost python3[28880]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:02 localhost python3[28897]: ansible-ansible.legacy.dnf Invoked with name=['tuned', 'tuned-profiles-cpu-partitioning'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 02:58:06 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Jan 23 02:58:06 localhost dbus-broker-launch[750]: Noticed file-system modification, trigger reload. Jan 23 02:58:06 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:58:06 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:58:06 localhost systemd[1]: Reloading. Jan 23 02:58:06 localhost systemd-sysv-generator[28969]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 02:58:06 localhost systemd-rc-local-generator[28966]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 02:58:06 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 02:58:06 localhost systemd[1]: Queuing reload/restart jobs for marked units… Jan 23 02:58:06 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Jan 23 02:58:06 localhost systemd[1]: tuned.service: Deactivated successfully. Jan 23 02:58:06 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Jan 23 02:58:06 localhost systemd[1]: tuned.service: Consumed 1.741s CPU time. Jan 23 02:58:06 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 02:58:06 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:58:06 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:58:06 localhost systemd[1]: run-rb8d93bc2a88649b9a925a68cd5dce922.service: Deactivated successfully. Jan 23 02:58:08 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 02:58:08 localhost systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Jan 23 02:58:08 localhost systemd[1]: Starting man-db-cache-update.service... Jan 23 02:58:08 localhost systemd[1]: man-db-cache-update.service: Deactivated successfully. Jan 23 02:58:08 localhost systemd[1]: Finished man-db-cache-update.service. Jan 23 02:58:08 localhost systemd[1]: run-ra72774caf6454318b646807615db44ee.service: Deactivated successfully. Jan 23 02:58:09 localhost python3[29342]: ansible-systemd Invoked with name=tuned state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 02:58:09 localhost systemd[1]: Stopping Dynamic System Tuning Daemon... Jan 23 02:58:09 localhost systemd[1]: tuned.service: Deactivated successfully. Jan 23 02:58:09 localhost systemd[1]: Stopped Dynamic System Tuning Daemon. Jan 23 02:58:09 localhost systemd[1]: Starting Dynamic System Tuning Daemon... Jan 23 02:58:11 localhost systemd[1]: Started Dynamic System Tuning Daemon. Jan 23 02:58:11 localhost python3[29538]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:12 localhost python3[29555]: ansible-slurp Invoked with src=/etc/tuned/active_profile Jan 23 02:58:12 localhost python3[29571]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:13 localhost python3[29587]: ansible-ansible.legacy.command Invoked with _raw_params=tuned-adm profile throughput-performance _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:15 localhost python3[29607]: ansible-ansible.legacy.command Invoked with _raw_params=cat /proc/cmdline _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:15 localhost python3[29624]: ansible-stat Invoked with path=/var/lib/config-data/puppet-generated/nova_libvirt/etc/nova/nova.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:17 localhost python3[29640]: ansible-replace Invoked with regexp=TRIPLEO_HEAT_TEMPLATE_KERNEL_ARGS dest=/etc/default/grub replace= path=/etc/default/grub backup=False encoding=utf-8 unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:22 localhost python3[29656]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:22 localhost python3[29704]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:23 localhost python3[29749]: ansible-ansible.legacy.copy Invoked with mode=384 dest=/etc/puppet/hiera.yaml src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155102.5714252-86926-92566830516102/source _original_basename=tmp3kos3ab8 follow=False checksum=aaf3699defba931d532f4955ae152f505046749a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:23 localhost python3[29779]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:24 localhost python3[29827]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:24 localhost python3[29870]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155104.1551516-87129-224047413119874/source dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json follow=False checksum=4c6f6f1e157c95c018a9a3fc557f58bca6ba52ee backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:25 localhost python3[29932]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:25 localhost python3[29975]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155105.151333-87295-9355913357611/source dest=/etc/puppet/hieradata/bootstrap_node.json mode=None follow=False _original_basename=bootstrap_node.j2 checksum=47e9dc10400b5a5894a9784d46950858e4030f13 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:26 localhost python3[30037]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:27 localhost python3[30080]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155106.1738424-87295-144488478905175/source dest=/etc/puppet/hieradata/vip_data.json mode=None follow=False _original_basename=vip_data.j2 checksum=86b198682757f39396e7e285c6c5807167ea1f96 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:27 localhost python3[30142]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:28 localhost python3[30185]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155107.1938212-87295-42391360165942/source dest=/etc/puppet/hieradata/net_ip_map.json mode=None follow=False _original_basename=net_ip_map.j2 checksum=58a6ffe95d92c6d1cd6a9c438fa59ae801d53929 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:28 localhost python3[30247]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:29 localhost python3[30290]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155108.353023-87295-54581527812208/source dest=/etc/puppet/hieradata/cloud_domain.json mode=None follow=False _original_basename=cloud_domain.j2 checksum=64f5f309f5137b9e0913cbf22857157ecfa0f1f1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:29 localhost python3[30352]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:30 localhost python3[30395]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155109.297353-87295-50535781653646/source dest=/etc/puppet/hieradata/fqdn.json mode=None follow=False _original_basename=fqdn.j2 checksum=39d3321a62f58a0f95a28b5603674e14dbbebeba backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:30 localhost python3[30457]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:31 localhost python3[30500]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155110.2638907-87295-222498832588346/source dest=/etc/puppet/hieradata/service_names.json mode=None follow=False _original_basename=service_names.j2 checksum=f3a297f9489dbabd957eb904b4140ce21e05b558 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:31 localhost python3[30562]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:32 localhost python3[30605]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155111.248279-87295-147008747357713/source dest=/etc/puppet/hieradata/service_configs.json mode=None follow=False _original_basename=service_configs.j2 checksum=bc03d746e245e4d09238f3af0e483f473d83fd3a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:32 localhost python3[30667]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:33 localhost python3[30710]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155112.244217-87295-173708565460023/source dest=/etc/puppet/hieradata/extraconfig.json mode=None follow=False _original_basename=extraconfig.j2 checksum=5f36b2ea290645ee34d943220a14b54ee5ea5be5 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:33 localhost python3[30772]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:33 localhost python3[30815]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155113.1925676-87295-19421333920947/source dest=/etc/puppet/hieradata/role_extraconfig.json mode=None follow=False _original_basename=role_extraconfig.j2 checksum=ad2ff5cbdfc5332b5cb47860d7f73fa8fd81a43a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:34 localhost python3[30877]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:34 localhost python3[30920]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155114.1480649-87295-101887371637680/source dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json mode=None follow=False _original_basename=ovn_chassis_mac_map.j2 checksum=1a1caa6561cddaa45971cc918b7e1e7b2c5bec80 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:35 localhost python3[30950]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:58:36 localhost python3[30998]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:58:36 localhost python3[31041]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/ansible_managed.json owner=root group=root mode=0644 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155115.9367905-88827-261184366034360/source _original_basename=tmphbwl38z4 follow=False checksum=bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:58:41 localhost python3[31071]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_default_ipv4'] gather_timeout=10 fact_path=/etc/ansible/facts.d Jan 23 02:58:41 localhost python3[31132]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 38.102.83.1 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:46 localhost python3[31149]: ansible-ansible.legacy.command Invoked with _raw_params=ping -w 10 -c 5 192.168.122.10 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:51 localhost python3[31166]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 192.168.122.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:51 localhost python3[31189]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.18.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:52 localhost python3[31212]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.20.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:53 localhost python3[31235]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.17.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:53 localhost python3[31258]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.19.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:58:54 localhost python3[31281]: ansible-ansible.legacy.command Invoked with _raw_params=INT=$(ip ro get 172.21.0.103 | head -1 | sed -nr "s/.* dev (\w+) .*/\1/p")#012MTU=$(cat /sys/class/net/${INT}/mtu 2>/dev/null || echo "0")#012echo "$INT $MTU"#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 02:59:13 localhost systemd[26159]: Starting Mark boot as successful... Jan 23 02:59:13 localhost systemd[26159]: Finished Mark boot as successful. Jan 23 02:59:44 localhost python3[31305]: ansible-file Invoked with path=/etc/puppet/hieradata state=directory mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:44 localhost python3[31353]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hiera.yaml follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:45 localhost python3[31371]: ansible-ansible.legacy.file Invoked with mode=384 dest=/etc/puppet/hiera.yaml _original_basename=tmpkma15htq recurse=False state=file path=/etc/puppet/hiera.yaml force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:45 localhost python3[31401]: ansible-file Invoked with src=/etc/puppet/hiera.yaml dest=/etc/hiera.yaml state=link force=True path=/etc/hiera.yaml recurse=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:46 localhost python3[31449]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/all_nodes.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:46 localhost python3[31467]: ansible-ansible.legacy.file Invoked with dest=/etc/puppet/hieradata/all_nodes.json _original_basename=overcloud.json recurse=False state=file path=/etc/puppet/hieradata/all_nodes.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:47 localhost python3[31529]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/bootstrap_node.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:47 localhost python3[31547]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/bootstrap_node.json _original_basename=bootstrap_node.j2 recurse=False state=file path=/etc/puppet/hieradata/bootstrap_node.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:47 localhost python3[31609]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/vip_data.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:48 localhost python3[31627]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/vip_data.json _original_basename=vip_data.j2 recurse=False state=file path=/etc/puppet/hieradata/vip_data.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:48 localhost python3[31689]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/net_ip_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:49 localhost python3[31707]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/net_ip_map.json _original_basename=net_ip_map.j2 recurse=False state=file path=/etc/puppet/hieradata/net_ip_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:49 localhost python3[31769]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/cloud_domain.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:49 localhost python3[31787]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/cloud_domain.json _original_basename=cloud_domain.j2 recurse=False state=file path=/etc/puppet/hieradata/cloud_domain.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:50 localhost python3[31849]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/fqdn.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:50 localhost python3[31867]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/fqdn.json _original_basename=fqdn.j2 recurse=False state=file path=/etc/puppet/hieradata/fqdn.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:51 localhost python3[31929]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_names.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:51 localhost python3[31947]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_names.json _original_basename=service_names.j2 recurse=False state=file path=/etc/puppet/hieradata/service_names.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:52 localhost python3[32009]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/service_configs.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:52 localhost python3[32027]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/service_configs.json _original_basename=service_configs.j2 recurse=False state=file path=/etc/puppet/hieradata/service_configs.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:52 localhost python3[32089]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:53 localhost python3[32107]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/extraconfig.json _original_basename=extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:53 localhost python3[32169]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/role_extraconfig.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:54 localhost python3[32187]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/role_extraconfig.json _original_basename=role_extraconfig.j2 recurse=False state=file path=/etc/puppet/hieradata/role_extraconfig.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:54 localhost python3[32249]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ovn_chassis_mac_map.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:54 localhost python3[32267]: ansible-ansible.legacy.file Invoked with mode=None dest=/etc/puppet/hieradata/ovn_chassis_mac_map.json _original_basename=ovn_chassis_mac_map.j2 recurse=False state=file path=/etc/puppet/hieradata/ovn_chassis_mac_map.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:55 localhost python3[32297]: ansible-stat Invoked with path={'src': '/etc/puppet/hieradata/ansible_managed.json'} follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 02:59:56 localhost python3[32345]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/ansible_managed.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 02:59:56 localhost python3[32363]: ansible-ansible.legacy.file Invoked with owner=root group=root mode=0644 dest=/etc/puppet/hieradata/ansible_managed.json _original_basename=tmpbwn2ztss recurse=False state=file path=/etc/puppet/hieradata/ansible_managed.json force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 02:59:56 localhost sshd[32378]: main: sshd: ssh-rsa algorithm is disabled Jan 23 02:59:59 localhost python3[32394]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:05 localhost python3[32411]: ansible-ansible.builtin.systemd Invoked with name=iptables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:06 localhost python3[32429]: ansible-ansible.builtin.systemd Invoked with name=ip6tables.service state=stopped enabled=False daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:06 localhost python3[32447]: ansible-ansible.builtin.systemd Invoked with name=nftables state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:00:07 localhost systemd[1]: Reloading. Jan 23 03:00:07 localhost systemd-rc-local-generator[32473]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:07 localhost systemd-sysv-generator[32479]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:08 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:08 localhost systemd[1]: Starting Netfilter Tables... Jan 23 03:00:08 localhost systemd[1]: Finished Netfilter Tables. Jan 23 03:00:08 localhost python3[32537]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/iptables.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:09 localhost python3[32580]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/iptables.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155208.5271435-93068-250759061574474/source _original_basename=iptables.nft follow=False checksum=ede9860c99075946a7bc827210247aac639bc84a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:09 localhost python3[32610]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/iptables.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:10 localhost python3[32628]: ansible-ansible.legacy.command Invoked with _raw_params=nft -j list ruleset _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:10 localhost python3[32677]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:11 localhost python3[32720]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155210.347956-93304-95241741357503/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:11 localhost python3[32782]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-update-jumps.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:12 localhost python3[32825]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-update-jumps.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155211.4311938-93448-141542049768977/source mode=None follow=False _original_basename=jump-chain.j2 checksum=eec306c3276262a27663d76bd0ea526457445afa backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:12 localhost python3[32887]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-flushes.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:13 localhost python3[32930]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-flushes.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155212.5233142-93608-125373629161763/source mode=None follow=False _original_basename=flush-chain.j2 checksum=e8e7b8db0d61a7fe393441cc91613f470eb34a6e backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:13 localhost python3[32992]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-chains.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:14 localhost python3[33035]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-chains.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155213.4989626-93734-92871287319666/source mode=None follow=False _original_basename=chains.j2 checksum=e60ee651f5014e83924f4e901ecc8e25b1906610 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:15 localhost python3[33097]: ansible-ansible.legacy.stat Invoked with path=/etc/nftables/tripleo-rules.nft follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:16 localhost python3[33140]: ansible-ansible.legacy.copy Invoked with dest=/etc/nftables/tripleo-rules.nft src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155214.4975896-93843-118779943343954/source mode=None follow=False _original_basename=ruleset.j2 checksum=f3487dfc0a90bd6214637cfa4d839c408ea37185 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:16 localhost python3[33170]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-chains.nft /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft /etc/nftables/tripleo-jumps.nft | nft -c -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:17 localhost python3[33235]: ansible-ansible.builtin.blockinfile Invoked with path=/etc/sysconfig/nftables.conf backup=False validate=nft -c -f %s block=include "/etc/nftables/iptables.nft"#012include "/etc/nftables/tripleo-chains.nft"#012include "/etc/nftables/tripleo-rules.nft"#012include "/etc/nftables/tripleo-jumps.nft"#012 state=present marker=# {mark} ANSIBLE MANAGED BLOCK create=False marker_begin=BEGIN marker_end=END unsafe_writes=False insertafter=None insertbefore=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:17 localhost python3[33252]: ansible-ansible.legacy.command Invoked with _raw_params=nft -f /etc/nftables/tripleo-chains.nft _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:18 localhost python3[33269]: ansible-ansible.legacy.command Invoked with _raw_params=cat /etc/nftables/tripleo-flushes.nft /etc/nftables/tripleo-rules.nft /etc/nftables/tripleo-update-jumps.nft | nft -f - _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:18 localhost python3[33288]: ansible-file Invoked with mode=0750 path=/var/log/containers/ceilometer setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:18 localhost python3[33304]: ansible-seboolean Invoked with name=virt_sandbox_use_netlink persistent=True state=True ignore_selinux_state=False Jan 23 03:00:19 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=8 res=1 Jan 23 03:00:19 localhost python3[33324]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:20 localhost python3[33340]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/cinder-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:20 localhost python3[33356]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/cinder(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:21 localhost kernel: SELinux: Converting 2717 SID table entries... Jan 23 03:00:21 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:21 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:21 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:21 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=9 res=1 Jan 23 03:00:21 localhost python3[33377]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:22 localhost python3[33393]: ansible-file Invoked with path=/var/lib/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:22 localhost python3[33409]: ansible-file Invoked with path=/var/lib/tripleo-config/ceph state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:22 localhost python3[33425]: ansible-file Invoked with mode=0750 path=/var/log/containers/cinder setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:23 localhost python3[33441]: ansible-ansible.legacy.dnf Invoked with name=['lvm2'] state=latest allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:26 localhost python3[33458]: ansible-ansible.legacy.command Invoked with creates=/var/lib/cinder/cinder-volumes _raw_params=dd if=/dev/zero of=/var/lib/cinder/cinder-volumes bs=1 count=0 seek=20480M _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Jan 23 03:00:26 localhost python3[33475]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=exit_code=0#012existing_device=$(losetup -j /var/lib/cinder/cinder-volumes -l -n -O NAME)#012if [[ -z "${existing_device}" ]]; then#012 losetup -f /var/lib/cinder/cinder-volumes --show#012 exit_code=2#012else#012 echo ${existing_device%$'\n'*}#012fi#012exit ${exit_code} _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Jan 23 03:00:26 localhost kernel: loop: module loaded Jan 23 03:00:26 localhost kernel: loop0: detected capacity change from 0 to 41943040 Jan 23 03:00:27 localhost python3[33500]: ansible-community.general.lvg Invoked with pvs=['/dev/loop0'] state=present vg=cinder-volumes pesize=4 pv_options= pvresize=False vg_options= force=False Jan 23 03:00:27 localhost lvm[33504]: PV /dev/loop0 not used. Jan 23 03:00:27 localhost lvm[33506]: PV /dev/loop0 online, VG cinder-volumes is complete. Jan 23 03:00:27 localhost systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Jan 23 03:00:27 localhost lvm[33508]: 0 logical volume(s) in volume group "cinder-volumes" now active Jan 23 03:00:27 localhost systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Jan 23 03:00:27 localhost python3[33556]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/cinder-lvm-losetup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:28 localhost python3[33599]: ansible-ansible.legacy.copy Invoked with dest=/etc/systemd/system/cinder-lvm-losetup.service src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155227.4602091-94737-143993147138307/source _original_basename=tmpm8rjmyv_ follow=False checksum=b96c2f9cc51ddf9c35f8cfb4cbac820751f42aef backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:28 localhost python3[33629]: ansible-systemd Invoked with daemon_reload=True enabled=True name=cinder-lvm-losetup daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 03:00:28 localhost systemd[1]: Reloading. Jan 23 03:00:28 localhost systemd-rc-local-generator[33658]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:28 localhost systemd-sysv-generator[33661]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:29 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:29 localhost systemd[1]: Reloading. Jan 23 03:00:29 localhost systemd-rc-local-generator[33693]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:00:29 localhost systemd-sysv-generator[33696]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:00:29 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:00:29 localhost python3[33720]: ansible-file Invoked with mode=0750 path=/var/log/containers/collectd setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[33736]: ansible-file Invoked with mode=0755 path=/var/lib/container-user-scripts/ setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[33752]: ansible-file Invoked with mode=0750 path=/var/log/containers/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:30 localhost python3[33768]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:31 localhost python3[33784]: ansible-file Invoked with path=/var/lib/glance setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:31 localhost python3[33800]: ansible-file Invoked with mode=0750 path=/var/log/containers/haproxy setype=var_log_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:31 localhost python3[33816]: ansible-file Invoked with path=/var/lib/haproxy setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:37 localhost python3[33962]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:37 localhost python3[33978]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:38 localhost python3[33994]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:38 localhost python3[34010]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/heat-api-cfn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34026]: ansible-file Invoked with mode=0750 path=/var/log/containers/heat setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34042]: ansible-file Invoked with mode=0750 path=/var/log/containers/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34058]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:39 localhost python3[34074]: ansible-file Invoked with path=/var/www setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:40 localhost python3[34090]: ansible-file Invoked with mode=01777 path=/var/tmp/horizon setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:40 localhost python3[34138]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/var-tmp-horizon.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:41 localhost python3[34181]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/var-tmp-horizon.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155240.390597-95660-254190763058485/source _original_basename=tmpkps4_zya follow=False checksum=804a78abbf39204f4c8abd5e4269fa10d8cb9df3 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:00:41 localhost python3[34211]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:42 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:42 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:42 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:42 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:42 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=10 res=1 Jan 23 03:00:43 localhost python3[34232]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/etc/target(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:43 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:43 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:43 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:43 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:44 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=11 res=1 Jan 23 03:00:44 localhost python3[34253]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/iscsi(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:00:45 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:00:45 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:00:45 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:00:45 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:00:45 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:00:45 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:00:45 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:00:45 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:00:45 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=12 res=1 Jan 23 03:00:45 localhost python3[34274]: ansible-file Invoked with path=/etc/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:45 localhost python3[34290]: ansible-file Invoked with path=/etc/target setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:46 localhost python3[34306]: ansible-file Invoked with path=/var/lib/iscsi setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:46 localhost python3[34322]: ansible-stat Invoked with path=/lib/systemd/system/iscsid.socket follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:00:47 localhost python3[34338]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-enabled --quiet iscsi.service _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:00:47 localhost python3[34355]: ansible-ansible.legacy.dnf Invoked with name=['dracut-config-generic'] state=absent allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:00:49 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:61:25:a2:5a:71 MACDST=fa:16:3e:26:d9:ab MACPROTO=0800 SRC=45.95.233.28 DST=38.102.83.236 LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=54321 PROTO=TCP SPT=58863 DPT=9090 SEQ=2057978527 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 23 03:00:51 localhost python3[34372]: ansible-file Invoked with path=/etc/modules-load.d state=directory mode=493 owner=root group=root setype=etc_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:51 localhost python3[34420]: ansible-ansible.legacy.stat Invoked with path=/etc/modules-load.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:52 localhost python3[34463]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155251.632274-96527-12801598912824/source dest=/etc/modules-load.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-modprobe.conf.j2 checksum=8021efe01721d8fa8cab46b95c00ec1be6dbb9d0 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:52 localhost python3[34493]: ansible-systemd Invoked with name=systemd-modules-load.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:00:52 localhost systemd[1]: systemd-modules-load.service: Deactivated successfully. Jan 23 03:00:52 localhost systemd[1]: Stopped Load Kernel Modules. Jan 23 03:00:52 localhost systemd[1]: Stopping Load Kernel Modules... Jan 23 03:00:52 localhost systemd[1]: Starting Load Kernel Modules... Jan 23 03:00:53 localhost kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jan 23 03:00:53 localhost kernel: Bridge firewalling registered Jan 23 03:00:53 localhost systemd-modules-load[34496]: Inserted module 'br_netfilter' Jan 23 03:00:53 localhost systemd-modules-load[34496]: Module 'msr' is built in Jan 23 03:00:53 localhost systemd[1]: Finished Load Kernel Modules. Jan 23 03:00:53 localhost python3[34547]: ansible-ansible.legacy.stat Invoked with path=/etc/sysctl.d/99-tripleo.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:00:53 localhost python3[34590]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155253.2041357-96654-94375157293847/source dest=/etc/sysctl.d/99-tripleo.conf mode=420 owner=root group=root setype=etc_t follow=False _original_basename=tripleo-sysctl.conf.j2 checksum=cddb9401fdafaaf28a4a94b98448f98ae93c94c9 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:00:54 localhost python3[34620]: ansible-sysctl Invoked with name=fs.inotify.max_user_instances value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:54 localhost python3[34638]: ansible-sysctl Invoked with name=kernel.pid_max value=1048576 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost python3[34656]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-arptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost python3[34673]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-ip6tables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost python3[34690]: ansible-sysctl Invoked with name=net.bridge.bridge-nf-call-iptables value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:55 localhost python3[34707]: ansible-sysctl Invoked with name=net.ipv4.conf.all.rp_filter value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:56 localhost python3[34725]: ansible-sysctl Invoked with name=net.ipv4.ip_forward value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:56 localhost python3[34743]: ansible-sysctl Invoked with name=net.ipv4.ip_local_reserved_ports value=35357,49000-49001 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:57 localhost python3[34761]: ansible-sysctl Invoked with name=net.ipv4.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[34779]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh1 value=1024 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[34797]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh2 value=2048 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:00:58 localhost python3[34815]: ansible-sysctl Invoked with name=net.ipv4.neigh.default.gc_thresh3 value=4096 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:00 localhost python3[34833]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:00 localhost python3[34850]: ansible-sysctl Invoked with name=net.ipv6.conf.all.forwarding value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:00 localhost python3[34867]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:01 localhost python3[34884]: ansible-sysctl Invoked with name=net.ipv6.conf.lo.disable_ipv6 value=0 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:01 localhost python3[34912]: ansible-sysctl Invoked with name=net.ipv6.ip_nonlocal_bind value=1 sysctl_set=True state=present sysctl_file=/etc/sysctl.d/99-tripleo.conf reload=False ignoreerrors=False Jan 23 03:01:01 localhost python3[34930]: ansible-systemd Invoked with name=systemd-sysctl.service state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:01:01 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 23 03:01:01 localhost systemd[1]: Stopped Apply Kernel Variables. Jan 23 03:01:01 localhost systemd[1]: Stopping Apply Kernel Variables... Jan 23 03:01:01 localhost systemd[1]: Starting Apply Kernel Variables... Jan 23 03:01:01 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jan 23 03:01:01 localhost systemd[1]: Finished Apply Kernel Variables. Jan 23 03:01:02 localhost python3[34950]: ansible-file Invoked with mode=0750 path=/var/log/containers/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:02 localhost python3[34966]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/keystone setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:03 localhost python3[34982]: ansible-stat Invoked with path=/etc/openldap/certs/certs_valid follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:03 localhost python3[34998]: ansible-stat Invoked with path=/etc/openldap/certs/cert9.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:04 localhost python3[35014]: ansible-stat Invoked with path=/etc/openldap/certs/key4.db follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:01:04 localhost python3[35030]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:04 localhost python3[35046]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/manila-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:05 localhost python3[35062]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:05 localhost python3[35078]: ansible-file Invoked with mode=0750 path=/var/log/containers/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:05 localhost python3[35094]: ansible-file Invoked with path=/var/lib/manila setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35110]: ansible-file Invoked with mode=0750 path=/var/log/containers/memcached setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35126]: ansible-file Invoked with mode=0750 path=/var/log/containers/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:06 localhost python3[35142]: ansible-file Invoked with path=/var/lib/metrics_qdr setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35158]: ansible-file Invoked with mode=0750 path=/var/log/containers/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35174]: ansible-file Invoked with path=/var/lib/mysql setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:07 localhost python3[35190]: ansible-file Invoked with mode=0750 path=/var/log/mariadb setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:08 localhost python3[35206]: ansible-file Invoked with mode=0750 path=/var/log/containers/neutron setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:08 localhost python3[35222]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/neutron-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:08 localhost python3[35238]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:09 localhost python3[35254]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-api setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:09 localhost python3[35270]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:09 localhost python3[35286]: ansible-file Invoked with mode=0750 path=/var/log/containers/nova setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:10 localhost python3[35302]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/nova-metadata setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:10 localhost python3[35318]: ansible-group Invoked with gid=107 name=qemu state=present system=False local=False non_unique=False Jan 23 03:01:11 localhost python3[35340]: ansible-user Invoked with comment=qemu user group=qemu name=qemu shell=/sbin/nologin state=present uid=107 non_unique=False force=False remove=False create_home=True system=False move_home=False append=False ssh_key_bits=0 ssh_key_type=rsa ssh_key_comment=ansible-generated on np0005593101.ooo.test update_password=always groups=None home=None password=NOT_LOGGING_PARAMETER login_class=None password_expire_max=None password_expire_min=None hidden=None seuser=None skeleton=None generate_ssh_key=None ssh_key_file=None ssh_key_passphrase=NOT_LOGGING_PARAMETER expires=None password_lock=None local=None profile=None authorization=None role=None umask=None Jan 23 03:01:11 localhost python3[35364]: ansible-seboolean Invoked with name=logrotate_read_inside_containers persistent=True state=True ignore_selinux_state=False Jan 23 03:01:12 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=13 res=1 Jan 23 03:01:12 localhost python3[35384]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:12 localhost python3[35400]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:13 localhost python3[35416]: ansible-file Invoked with mode=0750 path=/var/log/containers/openvswitch setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:13 localhost python3[35432]: ansible-file Invoked with path=/var/lib/openvswitch/ovn setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:14 localhost python3[35480]: ansible-ansible.legacy.stat Invoked with path=/usr/libexec/neutron-cleanup follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:14 localhost python3[35523]: ansible-ansible.legacy.copy Invoked with dest=/usr/libexec/neutron-cleanup force=True mode=0755 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155273.9292538-98390-31920271956877/source _original_basename=tmp1pujvdnl follow=False checksum=f9cc7d1e91fbae49caa7e35eb2253bba146a73b4 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:15 localhost python3[35585]: ansible-ansible.legacy.stat Invoked with path=/usr/lib/systemd/system/neutron-cleanup.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:15 localhost python3[35628]: ansible-ansible.legacy.copy Invoked with dest=/usr/lib/systemd/system/neutron-cleanup.service force=True src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155274.9016554-98488-173907558352097/source _original_basename=tmpti79gf9_ follow=False checksum=6b6cd9f074903a28d054eb530a10c7235d0c39fc backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:16 localhost python3[35658]: ansible-ansible.legacy.systemd Invoked with enabled=True name=neutron-cleanup daemon_reload=False daemon_reexec=False scope=system no_block=False state=None force=None masked=None Jan 23 03:01:16 localhost systemd[1]: Reloading. Jan 23 03:01:16 localhost systemd-rc-local-generator[35685]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:16 localhost systemd-sysv-generator[35689]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:16 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:16 localhost python3[35712]: ansible-ansible.builtin.lineinfile Invoked with path=/etc/systemd/logind.conf regexp=^\s*#?\s*HandlePowerKey\s*=.* state=absent backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None line=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:17 localhost python3[35728]: ansible-ansible.builtin.lineinfile Invoked with line=HandlePowerKey=ignore path=/etc/systemd/logind.conf regexp=^#?HandlePowerKey state=present backrefs=False create=False backup=False firstmatch=False unsafe_writes=False search_string=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:17 localhost python3[35744]: ansible-ansible.legacy.systemd Invoked with name=systemd-logind state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:01:17 localhost systemd[1]: Stopping User Login Management... Jan 23 03:01:17 localhost systemd[1]: systemd-logind.service: Deactivated successfully. Jan 23 03:01:17 localhost systemd[1]: Stopped User Login Management. Jan 23 03:01:17 localhost systemd[1]: Starting Load Kernel Module drm... Jan 23 03:01:17 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 23 03:01:17 localhost systemd[1]: Finished Load Kernel Module drm. Jan 23 03:01:17 localhost systemd[1]: Starting User Login Management... Jan 23 03:01:17 localhost systemd-logind[35752]: New seat seat0. Jan 23 03:01:17 localhost systemd-logind[35752]: Watching system buttons on /dev/input/event0 (Power Button) Jan 23 03:01:17 localhost systemd-logind[35752]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Jan 23 03:01:17 localhost systemd[1]: Started User Login Management. Jan 23 03:01:17 localhost systemd-logind[35752]: New session 14 of user zuul. Jan 23 03:01:17 localhost systemd-logind[35752]: New session 15 of user tripleo-admin. Jan 23 03:01:18 localhost python3[35768]: ansible-file Invoked with mode=0750 path=/var/log/containers/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:18 localhost python3[35784]: ansible-file Invoked with mode=0750 path=/var/log/containers/httpd/placement setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:18 localhost python3[35800]: ansible-community.general.sefcontext Invoked with setype=container_file_t state=present target=/var/lib/rabbitmq(/.*)? ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:01:19 localhost kernel: SELinux: Converting 2721 SID table entries... Jan 23 03:01:19 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:01:19 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:01:19 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:01:19 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:01:19 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:01:19 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:01:19 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:01:19 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=14 res=1 Jan 23 03:01:20 localhost python3[35821]: ansible-file Invoked with path=/var/lib/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:20 localhost python3[35837]: ansible-file Invoked with mode=0750 path=/var/log/containers/rabbitmq setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:20 localhost python3[35853]: ansible-ansible.legacy.command Invoked with _raw_params=echo 'export ERL_EPMD_ADDRESS=127.0.0.1' > /etc/rabbitmq/rabbitmq-env.conf#012echo 'export ERL_EPMD_PORT=4370' >> /etc/rabbitmq/rabbitmq-env.conf#012for pid in $(pgrep epmd --ns 1 --nslist pid); do kill $pid; done#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:21 localhost python3[35871]: ansible-ansible.legacy.dnf Invoked with name=['podman'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:24 localhost python3[35888]: ansible-setup Invoked with gather_subset=['!all', '!min', 'network'] filter=['ansible_interfaces'] gather_timeout=10 fact_path=/etc/ansible/facts.d Jan 23 03:01:25 localhost python3[35949]: ansible-file Invoked with path=/etc/containers/networks state=directory recurse=True mode=493 owner=root group=root force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:25 localhost python3[35965]: ansible-ansible.legacy.command Invoked with _raw_params=podman network inspect podman#012 _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:25 localhost systemd[26159]: Created slice User Background Tasks Slice. Jan 23 03:01:25 localhost systemd[1]: var-lib-containers-storage-overlay.mount: Deactivated successfully. Jan 23 03:01:25 localhost systemd[26159]: Starting Cleanup of User's Temporary Files and Directories... Jan 23 03:01:25 localhost systemd[26159]: Finished Cleanup of User's Temporary Files and Directories. Jan 23 03:01:26 localhost python3[36025]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/networks/podman.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:26 localhost python3[36068]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155285.8954213-99274-94534309994033/source dest=/etc/containers/networks/podman.json mode=0644 owner=root group=root follow=False _original_basename=podman_network_config.j2 checksum=13d360814ddf79015652996b237c771c17130052 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:27 localhost python3[36130]: ansible-ansible.legacy.stat Invoked with path=/etc/containers/registries.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:27 localhost python3[36175]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155286.9589171-99333-112731518960416/source dest=/etc/containers/registries.conf owner=root group=root setype=etc_t mode=0644 follow=False _original_basename=registries.conf.j2 checksum=710a00cfb11a4c3eba9c028ef1984a9fea9ba83a backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:28 localhost python3[36205]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=containers option=pids_limit value=4096 backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:28 localhost python3[36221]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=events_logger value="journald" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:28 localhost python3[36237]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=engine option=runtime value="crun" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:29 localhost python3[36253]: ansible-ini_file Invoked with path=/etc/containers/containers.conf owner=root group=root setype=etc_t mode=0644 create=True section=network option=network_backend value="netavark" backup=False state=present exclusive=True no_extra_spaces=False allow_no_value=False unsafe_writes=False values=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:30 localhost python3[36301]: ansible-ansible.legacy.stat Invoked with path=/etc/sysconfig/podman_drop_in follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:30 localhost python3[36344]: ansible-ansible.legacy.copy Invoked with dest=/etc/sysconfig/podman_drop_in src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155289.7275252-99518-34580397231549/source _original_basename=tmpbkmx5tqj follow=False checksum=0bfbc70e9a4740c9004b9947da681f723d529c83 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:30 localhost python3[36374]: ansible-file Invoked with path=/var/lib/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:31 localhost python3[36390]: ansible-file Invoked with mode=0750 path=/var/log/containers/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:31 localhost python3[36406]: ansible-file Invoked with path=/run/redis setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:32 localhost python3[36454]: ansible-ansible.legacy.stat Invoked with path=/etc/tmpfiles.d/run-redis.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:32 localhost python3[36497]: ansible-ansible.legacy.copy Invoked with dest=/etc/tmpfiles.d/run-redis.conf src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155291.737289-99724-272527222987375/source _original_basename=tmpzz2ezcpt follow=False checksum=07018f7099c8edadf6a52c86069ae4e2a9407b28 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:32 localhost python3[36527]: ansible-file Invoked with mode=0750 path=/var/log/containers/rsyslog setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:33 localhost python3[36543]: ansible-file Invoked with path=/var/lib/rsyslog.container setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:34 localhost python3[36559]: ansible-ansible.legacy.dnf Invoked with name=['openssh-server'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:37 localhost python3[36608]: ansible-ansible.legacy.stat Invoked with path=/etc/ssh/sshd_config follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:38 localhost python3[36653]: ansible-ansible.legacy.copy Invoked with dest=/etc/ssh/sshd_config src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155297.3007865-100229-252517387711105/source validate=/usr/sbin/sshd -T -f %s mode=None follow=False _original_basename=sshd_config_block.j2 checksum=92fbff64c26224c12f8a576f9ce1a758767bd467 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:38 localhost python3[36684]: ansible-systemd Invoked with name=sshd state=restarted enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:38 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 03:01:38 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 03:01:38 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 03:01:38 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 03:01:38 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 03:01:38 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:38 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:38 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:01:38 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 03:01:38 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 03:01:38 localhost sshd[36688]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:01:38 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 03:01:39 localhost python3[36704]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:39 localhost python3[36720]: ansible-file Invoked with path=/var/log/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:39 localhost python3[36736]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:40 localhost python3[36752]: ansible-file Invoked with path=/srv/node setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:40 localhost python3[36768]: ansible-file Invoked with path=/var/cache/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:40 localhost python3[36784]: ansible-file Invoked with mode=0750 path=/var/log/containers/swift setype=container_file_t state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:01:41 localhost python3[36800]: ansible-file Invoked with path=/srv/node/d1 state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:41 localhost python3[36816]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:42 localhost python3[36834]: ansible-ansible.legacy.command Invoked with _raw_params=systemctl is-active ntpd.service || systemctl is-enabled ntpd.service _uses_shell=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:43 localhost python3[36852]: ansible-ansible.legacy.dnf Invoked with name=['chrony'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:01:46 localhost python3[36901]: ansible-ansible.legacy.stat Invoked with path=/etc/chrony.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:47 localhost python3[36946]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155306.184225-100757-221275435102901/source dest=/etc/chrony.conf owner=root group=root mode=420 follow=False _original_basename=chrony.conf.j2 checksum=4fd4fbbb2de00c70a54478b7feb8ef8adf6a3362 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:47 localhost python3[36976]: ansible-ansible.legacy.systemd Invoked with enabled=True name=chronyd state=started daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:48 localhost python3[36994]: ansible-ansible.legacy.systemd Invoked with name=chronyd state=restarted daemon_reload=False daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:01:48 localhost chronyd[765]: chronyd exiting Jan 23 03:01:48 localhost systemd[1]: Stopping NTP client/server... Jan 23 03:01:48 localhost systemd[1]: chronyd.service: Deactivated successfully. Jan 23 03:01:48 localhost systemd[1]: Stopped NTP client/server. Jan 23 03:01:48 localhost systemd[1]: chronyd.service: Consumed 119ms CPU time, read 1.9M from disk, written 4.0K to disk. Jan 23 03:01:48 localhost systemd[1]: Starting NTP client/server... Jan 23 03:01:48 localhost chronyd[37001]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 03:01:48 localhost chronyd[37001]: Frequency -30.804 +/- 0.114 ppm read from /var/lib/chrony/drift Jan 23 03:01:48 localhost chronyd[37001]: Loaded seccomp filter (level 2) Jan 23 03:01:48 localhost systemd[1]: Started NTP client/server. Jan 23 03:01:49 localhost python3[37050]: ansible-ansible.legacy.stat Invoked with path=/etc/systemd/system/chrony-online.service follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:01:49 localhost python3[37093]: ansible-ansible.legacy.copy Invoked with src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155308.8322175-100886-122794340237782/source dest=/etc/systemd/system/chrony-online.service _original_basename=chrony-online.service follow=False checksum=d4d85e046d61f558ac7ec8178c6d529d893e81e1 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:01:50 localhost python3[37123]: ansible-systemd Invoked with state=started name=chrony-online.service enabled=True daemon-reload=True daemon_reload=True daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:01:50 localhost systemd[1]: Reloading. Jan 23 03:01:50 localhost systemd-sysv-generator[37154]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:50 localhost systemd-rc-local-generator[37150]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:50 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:50 localhost systemd[1]: Reloading. Jan 23 03:01:50 localhost systemd-rc-local-generator[37184]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:01:50 localhost systemd-sysv-generator[37187]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:01:50 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:01:50 localhost systemd[1]: Starting chronyd online sources service... Jan 23 03:01:50 localhost chronyc[37199]: 200 OK Jan 23 03:01:50 localhost systemd[1]: chrony-online.service: Deactivated successfully. Jan 23 03:01:50 localhost systemd[1]: Finished chronyd online sources service. Jan 23 03:01:51 localhost python3[37215]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:51 localhost chronyd[37001]: System clock was stepped by 0.000000 seconds Jan 23 03:01:51 localhost python3[37232]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:01:52 localhost chronyd[37001]: Selected source 216.128.178.20 (pool.ntp.org) Jan 23 03:02:01 localhost python3[37249]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc makestep _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:01 localhost chronyd[37001]: System clock was stepped by -0.000000 seconds Jan 23 03:02:02 localhost python3[37266]: ansible-ansible.legacy.command Invoked with _raw_params=chronyc waitsync 30 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:02 localhost python3[37283]: ansible-timezone Invoked with name=UTC hwclock=None Jan 23 03:02:02 localhost systemd[1]: Starting Time & Date Service... Jan 23 03:02:02 localhost systemd[1]: Started Time & Date Service. Jan 23 03:02:03 localhost python3[37303]: ansible-ansible.legacy.command Invoked with _raw_params=rpm -q --whatprovides tuned tuned-profiles-cpu-partitioning _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:04 localhost python3[37320]: ansible-ansible.legacy.command Invoked with _raw_params=which tuned-adm _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:05 localhost python3[37337]: ansible-slurp Invoked with src=/etc/tuned/active_profile Jan 23 03:02:05 localhost python3[37353]: ansible-stat Invoked with path=/etc/tuned/throughput-performance-variables.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:02:07 localhost python3[37369]: ansible-file Invoked with path=/var/log/containers state=directory setype=container_file_t selevel=s0 mode=488 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:07 localhost python3[37385]: ansible-file Invoked with path=/var/log/containers/stdouts state=directory selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None setype=None attributes=None Jan 23 03:02:08 localhost python3[37401]: ansible-file Invoked with path=/var/lib/tripleo-config state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:08 localhost python3[37417]: ansible-file Invoked with path=/var/lib/container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:08 localhost python3[37433]: ansible-file Invoked with path=/var/lib/docker-container-startup-configs.json state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:09 localhost python3[37449]: ansible-community.general.sefcontext Invoked with target=/var/lib/container-config-scripts(/.*)? setype=container_file_t state=present ignore_selinux_state=False ftype=a reload=True seuser=None selevel=None Jan 23 03:02:10 localhost kernel: SELinux: Converting 2723 SID table entries... Jan 23 03:02:10 localhost kernel: SELinux: policy capability network_peer_controls=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability open_perms=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability extended_socket_class=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability always_check_network=0 Jan 23 03:02:10 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 23 03:02:10 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Jan 23 03:02:10 localhost dbus-broker-launch[754]: avc: op=load_policy lsm=selinux seqno=15 res=1 Jan 23 03:02:10 localhost python3[37475]: ansible-file Invoked with path=/var/lib/container-config-scripts state=directory setype=container_file_t recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None attributes=None Jan 23 03:02:12 localhost python3[37612]: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-config/container-startup-config config_data={'step_0':********@\'localhost\' WITH GRANT OPTION;"\nmysql -uroot -p"$(hiera \'mysql::server::root_password\')" -e "DELETE FROM mysql.user WHERE user = \'root\' AND host NOT IN (\'%\',\'localhost\');"\ntimeout ${DB_MAX_TIMEOUT} mysqladmin -uroot -p"$(hiera \'mysql::server::root_password\')" shutdown'], 'detach': False, 'environment': {'DB_MARIABACKUP_PASSWORD': '8vXb4IKKnGGsuu5CBm6O5o27n', 'DB_MARIABACKUP_USER': 'mariabackup', 'DB_MAX_TIMEOUT': 60, 'KOLLA_BOOTSTRAP': True, 'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 1, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/mysql.json:/var/lib/kolla/config_files/config.json:rw,z', '/var/lib/config-data/puppet-generated/mysql:/var/lib/kolla/config_files/src:ro,z', '/var/lib/mysql:/var/lib/mysql:rw,z', '/etc/pki/tls/certs/mysql.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/mysql.crt:ro', '/etc/pki/tls/private/mysql.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/mysql.key:ro']}, 'mysql_data_ownership': {'command': ['chown', '-R', 'mysql:', '/var/lib/mysql'], 'detach': False, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/mysql:/var/lib/mysql:z']}, 'rabbitmq_bootstrap': {'command': ['bash', '-ec', 'kolla_set_configs\nif [[ -e "/var/lib/rabbitmq/.erlang.cookie" ]]; then rm -f /var/lib/rabbitmq/.erlang.cookie; fi\nhiera \'rabbitmq::erlang_cookie\' > /var/lib/rabbitmq/.erlang.cookie\nchown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie\nchmod 400 /var/lib/rabbitmq/.erlang.cookie'], 'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS', 'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-rabbitmq:17.1', 'net': 'host', 'privileged': False, 'start_order': 0, 'user': 'root', 'volumes': ['/var/lib/kolla/config_files/rabbitmq.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/rabbitmq:/var/lib/kolla/config_files/src:ro', '/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/var/lib/rabbitmq:/var/lib/rabbitmq:z', '/etc/puppet:/etc/puppet:ro,z']}, 'redis_tls_proxy': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-redis:17.1', 'net': 'host', 'restart': 'always', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/redis_tls_proxy.json:/var/lib/kolla/config_files/config.json:ro', '/var/lib/config-data/puppet-generated/redis:/var/lib/kolla/config_files/src:ro', '/etc/pki/tls/certs/redis.crt:/var/lib/kolla/config_files/src-tls/etc/pki/tls/certs/redis.crt:ro', '/etc/pki/tls/private/redis.key:/var/lib/kolla/config_files/src-tls/etc/pki/tls/private/redis.key:ro', '/var/lib/container-config-scripts/wait-port-and-run.sh:/wait-port-and-run.sh:ro']}}, 'step_2': {'cinder_api_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z', '/var/log/containers/httpd/cinder-api:/var/log/httpd:z']}, 'cinder_scheduler_init_logs': {'command': ['/bin/bash', '-c', 'chown -R cinder:cinder /var/log/cinder'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-cinder-scheduler:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/cinder:/var/log/cinder:z']}, 'clustercheck': {'environment': {'KOLLA_CONFIG_STRATEGY': 'COPY_ALWAYS'}, 'healthcheck': {'test': '/openstack/healthcheck'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'net': 'host', 'restart': 'always', 'start_order': 1, 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/pki/tls/certs/ca-bundle.trust.crt:ro', '/etc/pki/tls/cert.pem:/etc/pki/tls/cert.pem:ro', '/dev/log:/dev/log', '/etc/ipa/ca.crt:/etc/ipa/ca.crt:ro', '/etc/puppet:/etc/puppet:ro', '/var/lib/kolla/config_files/clustercheck.json:/var/lib/kolla/config_files/config.json', '/var/lib/config-data/puppet-generated/clustercheck:/var/lib/kolla/config_files/src:ro', '/var/lib/mysql:/var/lib/mysql']}, 'glance_init_logs': {'command': ['/bin/bash', '-c', 'chown -R glance:glance /var/log/glance'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-glance-api:17.1', 'net': 'none', 'privileged': False, 'user': 'root', 'volumes': ['/var/log/containers/glance:/var/log/glance:z', '/var/log/containers/httpd/glance:/var/log/httpd:z']}, 'heat_init_log': {'command': ['/bin/bash', '-c', 'chown -R heat:heat /var/log/heat'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-heat-engine:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/heat:/var/log/heat:z']}, 'horizon_fix_perms': {'command': ['/bin/bash', '-c', 'touch /var/log/horizon/horizon.log ; chown -R apache:apache /var/log/horizon && chmod -R a+rx /etc/openstack-dashboard'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-horizon:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/horizon:/var/log/horizon:z', '/var/log/containers/httpd/horizon:/var/log/httpd:z', '/var/lib/config-data/puppet-generated/horizon/etc/openstack-dashboard:/etc/openstack-dashboard']}, 'keystone_init_log': {'command': ['/bin/bash', '-c', 'chown -R keystone:keystone /var/log/keystone'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-keystone:17.1', 'net': 'none', 'start_order': 1, 'user': 'root', 'volumes': ['/var/log/containers/keystone:/var/log/keystone:z', '/var/log/containers/httpd/keystone:/var/log/httpd:z']}, 'manila_init_logs': {'command': ['/bin/bash', '-c', 'chown -R manila:manila /var/log/manila'], 'image': 'registry.redhat.io/rhosp-rhel9/openstack-manila-api:17.1', 'net': 'none', 'user': 'root', 'volumes': ['/var/log/containers/manila:/var/log/manila:z', '/var/log/containers/httpd/manila-api:/var/log/httpd:z']}, 'mysql_wait_bundle': {'command': ['/container_puppet_apply.sh', '2', 'file,file_line,concat,augeas,galera_ready,mysql_database,mysql_grant,mysql_user', 'include tripleo::profile::pacemaker::database::mysql_bundle'], 'detach': False, 'environment': {'TRIPLEO_DEPLOY_IDENTIFIER': '1769154735'}, 'image': 'registry.redhat.io/rhosp-rhel9/openstack-mariadb:17.1', 'ipc': 'host', 'net': 'host', 'start_order': 0, 'user': 'root', 'volumes': ['/etc/hosts:/etc/hosts:ro', '/etc/localtime:/etc/localtime:ro', '/etc/pki/ca-trust/extracted:/etc/pki/ca-trust/extracted:ro', '/etc/pki/ca-trust/source/anchors:/etc/pki/ca-trust/source/anchors:ro', '/etc/pki/tls/certs/ca-bundle.crt:/etc/pki/tls/certs/ca-bundle.crt:ro', '/etc/pki/tls/certs/ca-bundle.trust.crt:/etc/ Jan 23 03:02:12 localhost rsyslogd[758]: message too long (84240) with configured size 8096, begin of message is: ansible-container_startup_config Invoked with config_base_dir=/var/lib/tripleo-c [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Jan 23 03:02:13 localhost python3[37628]: ansible-file Invoked with path=/var/lib/kolla/config_files state=directory setype=container_file_t selevel=s0 recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:13 localhost python3[37644]: ansible-file Invoked with path=/var/lib/config-data mode=493 state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:02:13 localhost python3[37660]: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/config_files/ceilometer_agent_central.json': {'command': '/usr/bin/ceilometer-polling --polling-namespaces central --logfile /var/log/ceilometer/central.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_gnocchi_upgrade.json': {'command': "/usr/bin/bootstrap_host_exec ceilometer_agent_central su ceilometer -s /bin/bash -c 'for n in {1..10}; do /usr/bin/ceilometer-upgrade && exit 0 || sleep 30; done; exit 1'", 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/ceilometer_agent_notification.json': {'command': '/usr/bin/ceilometer-agent-notification --logfile /var/log/ceilometer/agent-notification.log', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/cinder_api.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}]}, '/var/lib/kolla/config_files/cinder_api_db_sync.json': {'command': "/usr/bin/bootstrap_host_exec cinder_api su cinder -s /bin/bash -c 'cinder-manage db sync --bump-versions'", 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modules.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.modules.d'}, {'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_backup.json': {'command': '/usr/bin/cinder-backup --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_scheduler.json': {'command': '/usr/bin/cinder-scheduler --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/cinder_volume.json': {'command': '/usr/bin/cinder-volume --config-file /usr/share/cinder/cinder-dist.conf --config-file /etc/cinder/cinder.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}, {'dest': '/', 'merge': True, 'optional': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-tls/*'}], 'permissions': [{'owner': 'cinder:cinder', 'path': '/var/log/cinder', 'recurse': True}, {'owner': 'cinder:cinder', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/certs/etcd.crt'}, {'owner': 'cinder:cinder', 'path': '/etc/pki/tls/private/etcd.key'}]}, '/var/lib/kolla/config_files/clustercheck.json': {'command': 'bash -c $* -- eval source /etc/sysconfig/clustercheck; exec socat -T"${TRIPLEO_HEALTHCHECK_TIMEOUT:-2}" "$TRIPLEO_SOCAT_BIND" system:"grep -qPe \\"^\\\\r\\$\\" && /usr/bin/clustercheck"', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}]}, '/var/lib/kolla/config_files/collectd.json': {'command': '/usr/sbin/collectd -f', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/collectd.d'}], 'permissions': [{'owner': 'collectd:collectd', 'path': '/var/log/collectd', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/scripts', 'recurse': True}, {'owner': 'collectd:collectd', 'path': '/config-scripts', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api.json': {'command': '/usr/bin/glance-api --config-file /usr/share/glance/glance-api-dist.conf --config-file /etc/glance/glance-api.conf --config-file /etc/glance/glance-image-import.conf', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}, {'dest': '/etc/ceph/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-ceph/'}, {'dest': '/etc/iscsi/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src-iscsid/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/lib/glance', 'recurse': True}, {'owner': 'glance:glance', 'path': '/etc/ceph/ceph.client.openstack.keyring', 'perm': '0600'}]}, '/var/lib/kolla/config_files/glance_api_cron.json': {'command': '/usr/sbin/crond -n', 'config_files': [{'dest': '/', 'merge': True, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/*'}], 'permissions': [{'owner': 'glance:glance', 'path': '/var/log/glance', 'recurse': True}]}, '/var/lib/kolla/config_files/glance_api_tls_proxy.json': {'command': '/usr/sbin/httpd -DFOREGROUND', 'config_files': [{'dest': '/etc/httpd/conf.d', 'merge': False, 'preserve_properties': True, 'source': '/var/lib/kolla/config_files/src/etc/httpd/conf.d'}, {'dest': '/etc/httpd/conf.modul Jan 23 03:02:14 localhost rsyslogd[758]: message too long (37323) with configured size 8096, begin of message is: ansible-tripleo_container_configs Invoked with config_data={'/var/lib/kolla/conf [v8.2102.0-111.el9 try https://www.rsyslog.com/e/2445 ] Jan 23 03:02:21 localhost python3[37676]: ansible-stat Invoked with path=/etc/ipa/default.conf follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:02:22 localhost python3[37692]: ansible-ipaclient_test Invoked with domain=ooo.test servers=['ipa.ooo.test'] hostname=np0005593101.ooo.test no_ntp=False force_ntpd=False no_nisdomain=False kinit_attempts=5 configure_firefox=False all_ip_addresses=False on_master=False enable_dns_updates=False realm=None ntp_servers=None ntp_pool=None nisdomain=None ca_cert_files=None firefox_dir=None ip_addresses=None Jan 23 03:02:23 localhost python3[37715]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:24 localhost python3[37731]: ansible-ipaclient_setup_ntp Invoked with ntp_servers=[''] ntp_pool= no_ntp=False on_master=False servers=['ipa.ooo.test'] domain=ooo.test Jan 23 03:02:24 localhost systemd[1]: Reloading. Jan 23 03:02:24 localhost systemd-sysv-generator[37766]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:24 localhost systemd-rc-local-generator[37761]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:24 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:24 localhost chronyd[37001]: chronyd exiting Jan 23 03:02:24 localhost systemd[1]: Stopping NTP client/server... Jan 23 03:02:24 localhost systemd[1]: chronyd.service: Deactivated successfully. Jan 23 03:02:24 localhost systemd[1]: Stopped NTP client/server. Jan 23 03:02:24 localhost systemd[1]: Starting NTP client/server... Jan 23 03:02:24 localhost chronyd[37782]: chronyd version 4.3 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Jan 23 03:02:24 localhost chronyd[37782]: Frequency -30.804 +/- 0.114 ppm read from /var/lib/chrony/drift Jan 23 03:02:24 localhost chronyd[37782]: Loaded seccomp filter (level 2) Jan 23 03:02:24 localhost systemd[1]: Started NTP client/server. Jan 23 03:02:29 localhost chronyd[37782]: Selected source 216.232.132.95 (pool.ntp.org) Jan 23 03:02:31 localhost python3[37801]: ansible-ipaclient_test_keytab Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593101.ooo.test kdc=ipa.ooo.test kinit_attempts=5 Jan 23 03:02:32 localhost systemd[1]: systemd-timedated.service: Deactivated successfully. Jan 23 03:02:32 localhost python3[37822]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/sbin/ipa-rmkeytab -k /etc/krb5.keytab -r "OOO.TEST"#012 _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 03:02:33 localhost python3[37841]: ansible-ipaclient_set_hostname Invoked with hostname=np0005593101.ooo.test Jan 23 03:02:33 localhost systemd[1]: Starting Hostname Service... Jan 23 03:02:33 localhost systemd[1]: Started Hostname Service. Jan 23 03:02:34 localhost python3[37860]: ansible-ipaclient_temp_krb5 Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593101.ooo.test kdc=ipa.ooo.test on_master=False Jan 23 03:02:35 localhost python3[37881]: ansible-ipaclient_join Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005593101.ooo.test force_join=False password=NOT_LOGGING_PARAMETER kinit_attempts=5 krb_name=/tmp/tmp2dxtt1y2 principal=None keytab=None admin_keytab=None ca_cert_file=None debug=None Jan 23 03:02:35 localhost python3[37881]: ansible-ipaclient_join Enrolled in IPA realm OOO.TEST Jan 23 03:02:36 localhost python3[37902]: ansible-ipaclient_ipa_conf Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593101.ooo.test basedn=dc=ooo,dc=test Jan 23 03:02:37 localhost python3[37919]: ansible-ipaclient_setup_sssd Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST hostname=np0005593101.ooo.test on_master=False no_ssh=False no_sshd=False no_sudo=False all_ip_addresses=False fixed_primary=False permit=False enable_dns_updates=False preserve_sssd=False no_krb5_offline_passwords=False Jan 23 03:02:37 localhost systemd-journald[618]: Field hash table of /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal has a fill level at 76.0 (253 of 333 items), suggesting rotation. Jan 23 03:02:37 localhost systemd-journald[618]: /run/log/journal/3e33164a5d30c3060156ec878079cfde/system.journal: Journal header limits reached or header out-of-date, rotating. Jan 23 03:02:37 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 03:02:37 localhost rsyslogd[758]: imjournal: journal files changed, reloading... [v8.2102.0-111.el9 try https://www.rsyslog.com/e/0 ] Jan 23 03:02:38 localhost python3[37937]: ansible-ipaclient_api Invoked with servers=['ipa.ooo.test'] realm=OOO.TEST hostname=np0005593101.ooo.test krb_name=/tmp/tmp2dxtt1y2 debug=False Jan 23 03:02:40 localhost python3[37966]: ansible-ipaclient_setup_nss Invoked with servers=['ipa.ooo.test'] domain=ooo.test realm=OOO.TEST basedn=dc=ooo,dc=test hostname=np0005593101.ooo.test subject_base=O=OOO.TEST principal=admin mkhomedir=False ca_enabled=True on_master=False dnsok=False enable_dns_updates=False all_ip_addresses=False request_cert=False preserve_sssd=False no_ssh=False no_sshd=False no_sudo=False fixed_primary=False permit=False no_krb5_offline_passwords=False no_dns_sshfp=False nosssd_files={} krb_name=/tmp/tmp2dxtt1y2 ip_addresses=None Jan 23 03:02:44 localhost systemd[1]: Starting System Security Services Daemon... Jan 23 03:02:44 localhost sssd[38001]: Starting up Jan 23 03:02:44 localhost sssd_be[38002]: Starting up Jan 23 03:02:44 localhost sssd_sudo[38006]: Starting up Jan 23 03:02:44 localhost sssd_nss[38003]: Starting up Jan 23 03:02:44 localhost sssd_ssh[38005]: Starting up Jan 23 03:02:44 localhost sssd_pam[38004]: Starting up Jan 23 03:02:44 localhost sssd_pac[38007]: Starting up Jan 23 03:02:44 localhost systemd[1]: Started System Security Services Daemon. Jan 23 03:02:44 localhost systemd[1]: Reloading. Jan 23 03:02:44 localhost systemd-sysv-generator[38039]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:44 localhost systemd-rc-local-generator[38033]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:44 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:45 localhost python3[38062]: ansible-ipaclient_setup_ssh Invoked with servers=['ipa.ooo.test'] sssd=True no_ssh=False ssh_trust_dns=False no_sshd=False Jan 23 03:02:46 localhost systemd[1]: Stopping OpenSSH server daemon... Jan 23 03:02:46 localhost systemd[1]: sshd.service: Deactivated successfully. Jan 23 03:02:46 localhost systemd[1]: Stopped OpenSSH server daemon. Jan 23 03:02:46 localhost systemd[1]: Stopped target sshd-keygen.target. Jan 23 03:02:46 localhost systemd[1]: Stopping sshd-keygen.target... Jan 23 03:02:46 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:46 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:46 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Jan 23 03:02:46 localhost systemd[1]: Reached target sshd-keygen.target. Jan 23 03:02:46 localhost systemd[1]: Starting OpenSSH server daemon... Jan 23 03:02:46 localhost sshd[38067]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:02:46 localhost systemd[1]: Started OpenSSH server daemon. Jan 23 03:02:46 localhost python3[38084]: ansible-ipaclient_setup_automount Invoked with servers=['ipa.ooo.test'] sssd=True automount_location=None Jan 23 03:02:47 localhost python3[38101]: ansible-ipaclient_setup_nis Invoked with domain=ooo.test nisdomain=None Jan 23 03:02:47 localhost systemd[1]: Reloading. Jan 23 03:02:47 localhost systemd-rc-local-generator[38127]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:47 localhost systemd-sysv-generator[38133]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:47 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:48 localhost systemd[1]: nis-domainname.service: Deactivated successfully. Jan 23 03:02:48 localhost systemd[1]: Stopped Read and set NIS domainname from /etc/sysconfig/network. Jan 23 03:02:48 localhost systemd[1]: Stopping Read and set NIS domainname from /etc/sysconfig/network... Jan 23 03:02:48 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Jan 23 03:02:48 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Jan 23 03:02:48 localhost python3[38160]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp2dxtt1y2 state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:49 localhost python3[38176]: ansible-ipaclient_setup_krb5 Invoked with realm=OOO.TEST domain=ooo.test servers=['ipa.ooo.test'] kdc=ipa.ooo.test dnsok=False client_domain=ooo.test hostname=np0005593101.ooo.test sssd=True force=True Jan 23 03:02:49 localhost python3[38197]: ansible-ipaclient_setup_certmonger Invoked with realm=OOO.TEST hostname=np0005593101.ooo.test subject_base=O=OOO.TEST ca_enabled=True request_cert=False Jan 23 03:02:50 localhost python3[38216]: ansible-ansible.builtin.file Invoked with path=/etc/ipa/.dns_ccache state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:50 localhost python3[38232]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp2dxtt1y2 state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:51 localhost python3[38248]: ansible-ansible.builtin.file Invoked with path=/tmp/tmp2dxtt1y2.ipabkp state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:02:52 localhost python3[38264]: ansible-systemd Invoked with daemon_reload=True name=certmonger.service state=restarted daemon_reexec=False scope=system no_block=False enabled=None force=None masked=None Jan 23 03:02:52 localhost systemd[1]: Reloading. Jan 23 03:02:52 localhost systemd-sysv-generator[38289]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:02:52 localhost systemd-rc-local-generator[38284]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:02:52 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:02:52 localhost systemd[1]: Starting Certificate monitoring and PKI enrollment... Jan 23 03:02:52 localhost certmonger[38302]: 2026-01-23 08:02:52 [38302] Changing to root directory. Jan 23 03:02:52 localhost certmonger[38302]: 2026-01-23 08:02:52 [38302] Obtaining system lock. Jan 23 03:02:52 localhost systemd[1]: Started Certificate monitoring and PKI enrollment. Jan 23 03:02:52 localhost certmonger[38303]: 2026-01-23 08:02:52 [38303] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:52 localhost certmonger[38304]: 2026-01-23 08:02:52 [38304] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:52 localhost certmonger[38305]: 2026-01-23 08:02:52 [38305] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:52 localhost certmonger[38306]: 2026-01-23 08:02:52 [38306] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:52 localhost certmonger[38307]: 2026-01-23 08:02:52 [38307] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:52 localhost certmonger[38308]: 2026-01-23 08:02:52 [38308] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:52 localhost certmonger[38309]: 2026-01-23 08:02:52 [38309] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:52 localhost certmonger[38310]: 2026-01-23 08:02:52 [38310] Running enrollment/cadata helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:02:52 localhost certmonger[38311]: 2026-01-23 08:02:52 [38311] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:52 localhost certmonger[38312]: 2026-01-23 08:02:52 [38312] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:52 localhost certmonger[38313]: 2026-01-23 08:02:52 [38313] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:52 localhost certmonger[38314]: 2026-01-23 08:02:52 [38314] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:52 localhost certmonger[38315]: 2026-01-23 08:02:52 [38315] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:52 localhost certmonger[38316]: 2026-01-23 08:02:52 [38316] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:52 localhost certmonger[38317]: 2026-01-23 08:02:52 [38317] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:52 localhost certmonger[38318]: 2026-01-23 08:02:52 [38318] Running enrollment/cadata helper "/usr/libexec/certmonger/dogtag-ipa-renew-agent-submit". Jan 23 03:02:52 localhost certmonger[38319]: 2026-01-23 08:02:52 [38319] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:52 localhost certmonger[38320]: 2026-01-23 08:02:52 [38320] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:52 localhost certmonger[38321]: 2026-01-23 08:02:52 [38321] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:52 localhost certmonger[38322]: 2026-01-23 08:02:52 [38322] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:52 localhost certmonger[38323]: 2026-01-23 08:02:52 [38323] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:52 localhost certmonger[38324]: 2026-01-23 08:02:52 [38324] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:52 localhost certmonger[38325]: 2026-01-23 08:02:52 [38325] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:52 localhost certmonger[38326]: 2026-01-23 08:02:52 [38326] Running enrollment/cadata helper "/usr/libexec/certmonger/local-submit". Jan 23 03:02:52 localhost certmonger[38302]: 2026-01-23 08:02:52 [38302] No hooks set for ca-pre-save command. Jan 23 03:02:52 localhost certmonger[38302]: 2026-01-23 08:02:52 [38302] No hooks set for ca-post-save command. Jan 23 03:02:52 localhost certmonger[38329]: 2026-01-23 08:02:52 [38329] Certificate "Local Signing Authority" valid for 31535999s. Jan 23 03:02:53 localhost certmonger[38302]: 2026-01-23 08:02:53 [38302] No hooks set for ca-pre-save command. Jan 23 03:02:53 localhost certmonger[38302]: 2026-01-23 08:02:53 [38302] No hooks set for ca-post-save command. Jan 23 03:02:53 localhost certmonger[38332]: 2026-01-23 08:02:53 [38332] Certificate "OOO.TEST IPA CA" valid for 631151025s. Jan 23 03:03:02 localhost python3[38380]: ansible-ansible.legacy.stat Invoked with path=/etc/puppet/hieradata/config_step.json follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Jan 23 03:03:03 localhost python3[38423]: ansible-ansible.legacy.copy Invoked with dest=/etc/puppet/hieradata/config_step.json force=True mode=0600 src=/home/tripleo-admin/.ansible/tmp/ansible-tmp-1769155382.575993-104313-70600832204479/source _original_basename=tmp6ql3z_1b follow=False checksum=dfdcc7695edd230e7a2c06fc7b739bfa56506d8f backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:03 localhost systemd[1]: systemd-hostnamed.service: Deactivated successfully. Jan 23 03:03:03 localhost python3[38453]: ansible-stat Invoked with path=/var/lib/tripleo-config/container-startup-config/step_1 follow=False get_md5=False get_checksum=True get_mime=True get_attributes=True checksum_algorithm=sha1 Jan 23 03:03:05 localhost python3[38579]: ansible-file Invoked with path=/var/lib/container-puppet state=directory setype=container_file_t selevel=s0 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None attributes=None Jan 23 03:03:07 localhost python3[38700]: ansible-container_puppet_config Invoked with update_config_hash_only=True no_archive=True check_mode=False config_vol_prefix=/var/lib/config-data debug=False net_host=True puppet_config= short_hostname= step=6 Jan 23 03:03:08 localhost python3[38716]: ansible-file Invoked with path=/etc/pki/tls/certs/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 03:03:09 localhost python3[38732]: ansible-file Invoked with path=/etc/pki/tls/private/httpd serole=object_r setype=cert_t seuser=system_u state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None selevel=None attributes=None Jan 23 03:03:10 localhost python3[38748]: ansible-setup Invoked with gather_subset=['min'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Jan 23 03:03:10 localhost python3[38768]: ansible-ansible.legacy.dnf Invoked with name=['python3-pyasn1', 'python3-cryptography', 'python3-dbus'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:03:14 localhost python3[38785]: ansible-ansible.legacy.dnf Invoked with name=['certmonger'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False conf_file=None disable_excludes=None download_dir=None list=None releasever=None Jan 23 03:03:17 localhost python3[38802]: ansible-file Invoked with name=/etc/certmonger//pre-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//pre-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:17 localhost python3[38818]: ansible-file Invoked with name=/etc/certmonger//post-scripts owner=root group=root mode=0700 state=directory path=/etc/certmonger//post-scripts recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Jan 23 03:03:17 localhost python3[38834]: ansible-ansible.legacy.systemd Invoked with name=certmonger state=started enabled=True daemon_reload=False daemon_reexec=False scope=system no_block=False force=None masked=None Jan 23 03:03:18 localhost systemd[1]: Reloading. Jan 23 03:03:18 localhost systemd-rc-local-generator[38862]: /etc/rc.d/rc.local is not marked executable, skipping. Jan 23 03:03:18 localhost systemd-sysv-generator[38867]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Jan 23 03:03:18 localhost systemd[1]: /usr/lib/systemd/system/insights-client-boot.service:24: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jan 23 03:03:19 localhost python3[38889]: ansible-certificate_request Invoked with name=httpd-ctlplane dns=['np0005593101.ctlplane.ooo.test'] principal=['HTTP/np0005593101.ctlplane.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-ctlplane.crt /etc/pki/tls/certs/httpd/httpd-ctlplane.crt#012cp /etc/pki/tls/private/httpd-ctlplane.key /etc/pki/tls/private/httpd/httpd-ctlplane.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593101.ctlplane.ooo.test" for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593101.ctlplane.ooo.test Jan 23 03:03:19 localhost certmonger[38899]: " for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593101.ctlplane.ooo.test@OOO.TEST Jan 23 03:03:19 localhost certmonger[38899]: " for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:19 localhost certmonger[38899]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTkzMTAxLmN0bHBsYW5lLm9v Jan 23 03:03:19 localhost certmonger[38899]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAveZ7ig2pW6xg Jan 23 03:03:19 localhost certmonger[38899]: XhmEBLoQzRW0SGVAw+K1mEvexoyXbtdgsESIko6yZcbshb3jI3B+8B1UdlrAiRT8 Jan 23 03:03:19 localhost certmonger[38899]: XNv69xD92R8Hs/eGgsnqoo5y2TGua12vB0gCloj4NNtzfjiRm4zV3v9K643COg82 Jan 23 03:03:19 localhost certmonger[38899]: Tzw050tC2XoPSD2cnrYZ/G1kdLsUAuu9O7T8JLf/2mWjfkl+VOz67aKNqVCYJY9q Jan 23 03:03:19 localhost certmonger[38899]: N+9qcFWaG3nDI0bWBVzv90NCQpyzA4k+Y0xnSkwlCeUNRXmRkkSatUrO3wlVP0y8 Jan 23 03:03:19 localhost certmonger[38899]: 9Ck7l4JMK0XVTd/wbuTOHA8+i6nwdlcIRIr0UTiMjmLgQGYBbrLuSbkeI7XGTc5M Jan 23 03:03:19 localhost certmonger[38899]: AplSDoSMUQIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIA Jan 23 03:03:19 localhost certmonger[38899]: MwAwADgAMAAzADEAOTCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Jan 23 03:03:19 localhost certmonger[38899]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDEuY3RscGxhbmUub29vLnRlc3Sg Jan 23 03:03:19 localhost certmonger[38899]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEwMS5jdGxwbGFuZS5vb28u Jan 23 03:03:19 localhost certmonger[38899]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Jan 23 03:03:19 localhost certmonger[38899]: oSgwJhsESFRUUBsebnAwMDA1NTkzMTAxLmN0bHBsYW5lLm9vby50ZXN0MB0GA1Ud Jan 23 03:03:19 localhost certmonger[38899]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Jan 23 03:03:19 localhost certmonger[38899]: BBQlFJTPOFPtsFbIFNsM+ocpOUAqqDANBgkqhkiG9w0BAQsFAAOCAQEABvDSdwKb Jan 23 03:03:19 localhost certmonger[38899]: 7O7fZRdfob+c485CZ+LPGMhLUFRguFys7G9J03V3K57+ujDXP9sbd5XVcWpVYocw Jan 23 03:03:19 localhost certmonger[38899]: 6Foy3IAuyXT4+KQS9XCZ76MlD17e7FGc14qgrqEbnqyCS69CDzuuunhwz7lnBABM Jan 23 03:03:19 localhost certmonger[38899]: fSyr60AhTHqV/jk+83Z5otjB4nkyDr6JwJdFs/2DLtvRBXiqqfrwuMCpmUbqp6Qu Jan 23 03:03:19 localhost certmonger[38899]: yLXwajyF+Lzn+6wgPm9I0FLokMehwZpPi7ljcyvdRK38pB8mHQlyYcVGKCqF5gXV Jan 23 03:03:19 localhost certmonger[38899]: vu8vCFQloKpQVlL5B7tTHxeILEVT8P/m/QBSkX9O3z7YfC5BKuvH7t+QvJMbS4RU Jan 23 03:03:19 localhost certmonger[38899]: OuQMveUMt0ryQQ== Jan 23 03:03:19 localhost certmonger[38899]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:19 localhost certmonger[38899]: " for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAveZ7ig2pW6xgXhmEBLoQzRW0SGVAw+K1mEvexoyXbtdgsESIko6yZcbshb3jI3B+8B1UdlrAiRT8XNv69xD92R8Hs/eGgsnqoo5y2TGua12vB0gCloj4NNtzfjiRm4zV3v9K643COg82Tzw050tC2XoPSD2cnrYZ/G1kdLsUAuu9O7T8JLf/2mWjfkl+VOz67aKNqVCYJY9qN+9qcFWaG3nDI0bWBVzv90NCQpyzA4k+Y0xnSkwlCeUNRXmRkkSatUrO3wlVP0y89Ck7l4JMK0XVTd/wbuTOHA8+i6nwdlcIRIr0UTiMjmLgQGYBbrLuSbkeI7XGTc5MAplSDoSMUQIDAQAB" for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:19 localhost certmonger[38899]: 2026-01-23 08:03:19 [38899] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:19 localhost certmonger[38302]: 2026-01-23 08:03:19 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:19 localhost certmonger[38899]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:20 localhost certmonger[38899]: Certificate: "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" Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Certificate submission still ongoing. Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Certificate submission attempt complete. Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Child status = 0. Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Child output: Jan 23 03:03:20 localhost certmonger[38302]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38302]: MIIFWDCCA8CgAwIBAgIQKNbFVStW4pwe9bI7D020KTANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:20 localhost certmonger[38302]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:20 localhost certmonger[38302]: aXR5MB4XDTI2MDEyMzA4MDMxOVoXDTI4MDEyNDA4MDMxOVowPDERMA8GA1UECgwI Jan 23 03:03:20 localhost certmonger[38302]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMS5jdGxwbGFuZS5vb28udGVz Jan 23 03:03:20 localhost certmonger[38302]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3me4oNqVusYF4ZhAS6 Jan 23 03:03:20 localhost certmonger[38302]: EM0VtEhlQMPitZhL3saMl27XYLBEiJKOsmXG7IW94yNwfvAdVHZawIkU/Fzb+vcQ Jan 23 03:03:20 localhost certmonger[38302]: /dkfB7P3hoLJ6qKOctkxrmtdrwdIApaI+DTbc344kZuM1d7/SuuNwjoPNk88NOdL Jan 23 03:03:20 localhost certmonger[38302]: Qtl6D0g9nJ62GfxtZHS7FALrvTu0/CS3/9plo35JflTs+u2ijalQmCWPajfvanBV Jan 23 03:03:20 localhost certmonger[38302]: mht5wyNG1gVc7/dDQkKcswOJPmNMZ0pMJQnlDUV5kZJEmrVKzt8JVT9MvPQpO5eC Jan 23 03:03:20 localhost certmonger[38302]: TCtF1U3f8G7kzhwPPoup8HZXCESK9FE4jI5i4EBmAW6y7km5HiO1xk3OTAKZUg6E Jan 23 03:03:20 localhost certmonger[38302]: jFECAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:20 localhost certmonger[38302]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38302]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:20 localhost certmonger[38302]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38302]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:20 localhost certmonger[38302]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGKCKku3 Jan 23 03:03:20 localhost certmonger[38302]: adfsYdCoMNQFvIEFXNjlMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMS5jdGxw Jan 23 03:03:20 localhost certmonger[38302]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAx Jan 23 03:03:20 localhost certmonger[38302]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:20 localhost certmonger[38302]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDEuY3RscGxhbmUu Jan 23 03:03:20 localhost certmonger[38302]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBADQC0tqm+ifQjUoAuDZzBdpZbnvz Jan 23 03:03:20 localhost certmonger[38302]: vbC89nmqINQBYb+SMRh6uLwGvbAraBAyQZpORFNF+srAy679mvLe/s0feWUgcRDg Jan 23 03:03:20 localhost certmonger[38302]: oIwA19Ydx8aVuHlYIZMlIRM/WvcDlW2okWuFCmfaxlkE4tWttE9oAF5f28bsb8Hh Jan 23 03:03:20 localhost certmonger[38302]: 16zQeNCxW3BrZ6Gal3SeNjbgK4eA5GRBaek3o/VzpD9ytLbttmXjfOnHBELotHpp Jan 23 03:03:20 localhost certmonger[38302]: /zsBubH7xtx0mhbqUscvxgyS8ypTQsyB4DPFpId9JiThwcjcrNxZCwcckHm2tujf Jan 23 03:03:20 localhost certmonger[38302]: AEoZpBGASdArDJKyuIKz35qR2OHg0qgPdUIa5g70OKz97L/XBC/IbyWq9rEdNPvS Jan 23 03:03:20 localhost certmonger[38302]: E3cDo86Tc38zNUJItT/Phm44pchptUev1VpyF8TN6BcP3NCDawI1dVxYRUq7/lNZ Jan 23 03:03:20 localhost certmonger[38302]: xjVeRIvRyiQwJ6/371IkjgYxhs9z0c8R8Dq3g6JpeFF/mGDcEaLLuPDFVD8ZUjCi Jan 23 03:03:20 localhost certmonger[38302]: LPXTMFLLnM+iZYe1ZRrRC1bj/JX7yXkPhm1tLw== Jan 23 03:03:20 localhost certmonger[38302]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38302]: " Jan 23 03:03:20 localhost certmonger[38901]: 2026-01-23 08:03:20 [38901] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38901]: MIIFWDCCA8CgAwIBAgIQKNbFVStW4pwe9bI7D020KTANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:20 localhost certmonger[38901]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:20 localhost certmonger[38901]: aXR5MB4XDTI2MDEyMzA4MDMxOVoXDTI4MDEyNDA4MDMxOVowPDERMA8GA1UECgwI Jan 23 03:03:20 localhost certmonger[38901]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMS5jdGxwbGFuZS5vb28udGVz Jan 23 03:03:20 localhost certmonger[38901]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3me4oNqVusYF4ZhAS6 Jan 23 03:03:20 localhost certmonger[38901]: EM0VtEhlQMPitZhL3saMl27XYLBEiJKOsmXG7IW94yNwfvAdVHZawIkU/Fzb+vcQ Jan 23 03:03:20 localhost certmonger[38901]: /dkfB7P3hoLJ6qKOctkxrmtdrwdIApaI+DTbc344kZuM1d7/SuuNwjoPNk88NOdL Jan 23 03:03:20 localhost certmonger[38901]: Qtl6D0g9nJ62GfxtZHS7FALrvTu0/CS3/9plo35JflTs+u2ijalQmCWPajfvanBV Jan 23 03:03:20 localhost certmonger[38901]: mht5wyNG1gVc7/dDQkKcswOJPmNMZ0pMJQnlDUV5kZJEmrVKzt8JVT9MvPQpO5eC Jan 23 03:03:20 localhost certmonger[38901]: TCtF1U3f8G7kzhwPPoup8HZXCESK9FE4jI5i4EBmAW6y7km5HiO1xk3OTAKZUg6E Jan 23 03:03:20 localhost certmonger[38901]: jFECAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:20 localhost certmonger[38901]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38901]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:20 localhost certmonger[38901]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38901]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:20 localhost certmonger[38901]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGKCKku3 Jan 23 03:03:20 localhost certmonger[38901]: adfsYdCoMNQFvIEFXNjlMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMS5jdGxw Jan 23 03:03:20 localhost certmonger[38901]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAx Jan 23 03:03:20 localhost certmonger[38901]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:20 localhost certmonger[38901]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDEuY3RscGxhbmUu Jan 23 03:03:20 localhost certmonger[38901]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBADQC0tqm+ifQjUoAuDZzBdpZbnvz Jan 23 03:03:20 localhost certmonger[38901]: vbC89nmqINQBYb+SMRh6uLwGvbAraBAyQZpORFNF+srAy679mvLe/s0feWUgcRDg Jan 23 03:03:20 localhost certmonger[38901]: oIwA19Ydx8aVuHlYIZMlIRM/WvcDlW2okWuFCmfaxlkE4tWttE9oAF5f28bsb8Hh Jan 23 03:03:20 localhost certmonger[38901]: 16zQeNCxW3BrZ6Gal3SeNjbgK4eA5GRBaek3o/VzpD9ytLbttmXjfOnHBELotHpp Jan 23 03:03:20 localhost certmonger[38901]: /zsBubH7xtx0mhbqUscvxgyS8ypTQsyB4DPFpId9JiThwcjcrNxZCwcckHm2tujf Jan 23 03:03:20 localhost certmonger[38901]: AEoZpBGASdArDJKyuIKz35qR2OHg0qgPdUIa5g70OKz97L/XBC/IbyWq9rEdNPvS Jan 23 03:03:20 localhost certmonger[38901]: E3cDo86Tc38zNUJItT/Phm44pchptUev1VpyF8TN6BcP3NCDawI1dVxYRUq7/lNZ Jan 23 03:03:20 localhost certmonger[38901]: xjVeRIvRyiQwJ6/371IkjgYxhs9z0c8R8Dq3g6JpeFF/mGDcEaLLuPDFVD8ZUjCi Jan 23 03:03:20 localhost certmonger[38901]: LPXTMFLLnM+iZYe1ZRrRC1bj/JX7yXkPhm1tLw== Jan 23 03:03:20 localhost certmonger[38901]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38901]: ". Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Certificate submission still ongoing. Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Certificate submission postprocessing complete. Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Child status = 0. Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Child output: Jan 23 03:03:20 localhost certmonger[38302]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nLPXTMFLLnM+iZYe1ZRrRC1bj/JX7yXkPhm1tLw==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:20 localhost certmonger[38302]: " Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38302]: MIIFWDCCA8CgAwIBAgIQKNbFVStW4pwe9bI7D020KTANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:20 localhost certmonger[38302]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:20 localhost certmonger[38302]: aXR5MB4XDTI2MDEyMzA4MDMxOVoXDTI4MDEyNDA4MDMxOVowPDERMA8GA1UECgwI Jan 23 03:03:20 localhost certmonger[38302]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMS5jdGxwbGFuZS5vb28udGVz Jan 23 03:03:20 localhost certmonger[38302]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3me4oNqVusYF4ZhAS6 Jan 23 03:03:20 localhost certmonger[38302]: EM0VtEhlQMPitZhL3saMl27XYLBEiJKOsmXG7IW94yNwfvAdVHZawIkU/Fzb+vcQ Jan 23 03:03:20 localhost certmonger[38302]: /dkfB7P3hoLJ6qKOctkxrmtdrwdIApaI+DTbc344kZuM1d7/SuuNwjoPNk88NOdL Jan 23 03:03:20 localhost certmonger[38302]: Qtl6D0g9nJ62GfxtZHS7FALrvTu0/CS3/9plo35JflTs+u2ijalQmCWPajfvanBV Jan 23 03:03:20 localhost certmonger[38302]: mht5wyNG1gVc7/dDQkKcswOJPmNMZ0pMJQnlDUV5kZJEmrVKzt8JVT9MvPQpO5eC Jan 23 03:03:20 localhost certmonger[38302]: TCtF1U3f8G7kzhwPPoup8HZXCESK9FE4jI5i4EBmAW6y7km5HiO1xk3OTAKZUg6E Jan 23 03:03:20 localhost certmonger[38302]: jFECAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:20 localhost certmonger[38302]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38302]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:20 localhost certmonger[38302]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:20 localhost certmonger[38302]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:20 localhost certmonger[38302]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFGKCKku3 Jan 23 03:03:20 localhost certmonger[38302]: adfsYdCoMNQFvIEFXNjlMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMS5jdGxw Jan 23 03:03:20 localhost certmonger[38302]: bGFuZS5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAx Jan 23 03:03:20 localhost certmonger[38302]: LmN0bHBsYW5lLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:20 localhost certmonger[38302]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDEuY3RscGxhbmUu Jan 23 03:03:20 localhost certmonger[38302]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBADQC0tqm+ifQjUoAuDZzBdpZbnvz Jan 23 03:03:20 localhost certmonger[38302]: vbC89nmqINQBYb+SMRh6uLwGvbAraBAyQZpORFNF+srAy679mvLe/s0feWUgcRDg Jan 23 03:03:20 localhost certmonger[38302]: oIwA19Ydx8aVuHlYIZMlIRM/WvcDlW2okWuFCmfaxlkE4tWttE9oAF5f28bsb8Hh Jan 23 03:03:20 localhost certmonger[38302]: 16zQeNCxW3BrZ6Gal3SeNjbgK4eA5GRBaek3o/VzpD9ytLbttmXjfOnHBELotHpp Jan 23 03:03:20 localhost certmonger[38302]: /zsBubH7xtx0mhbqUscvxgyS8ypTQsyB4DPFpId9JiThwcjcrNxZCwcckHm2tujf Jan 23 03:03:20 localhost certmonger[38302]: AEoZpBGASdArDJKyuIKz35qR2OHg0qgPdUIa5g70OKz97L/XBC/IbyWq9rEdNPvS Jan 23 03:03:20 localhost certmonger[38302]: E3cDo86Tc38zNUJItT/Phm44pchptUev1VpyF8TN6BcP3NCDawI1dVxYRUq7/lNZ Jan 23 03:03:20 localhost certmonger[38302]: xjVeRIvRyiQwJ6/371IkjgYxhs9z0c8R8Dq3g6JpeFF/mGDcEaLLuPDFVD8ZUjCi Jan 23 03:03:20 localhost certmonger[38302]: LPXTMFLLnM+iZYe1ZRrRC1bj/JX7yXkPhm1tLw== Jan 23 03:03:20 localhost certmonger[38302]: -----END CERTIFICATE----- Jan 23 03:03:20 localhost certmonger[38302]: ". Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] No hooks set for pre-save command. Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost certmonger[38909]: Certificate in file "/etc/pki/tls/certs/httpd-ctlplane.crt" issued by CA and saved. Jan 23 03:03:20 localhost certmonger[38302]: 2026-01-23 08:03:20 [38302] Wrote to /var/lib/certmonger/requests/20260123080319 Jan 23 03:03:20 localhost systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Jan 23 03:03:20 localhost systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Jan 23 03:03:20 localhost systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Jan 23 03:03:20 localhost systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Jan 23 03:03:20 localhost python3[38929]: ansible-certificate_request Invoked with name=httpd-storage dns=['np0005593101.storage.ooo.test'] principal=['HTTP/np0005593101.storage.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage.crt /etc/pki/tls/certs/httpd/httpd-storage.crt#012cp /etc/pki/tls/private/httpd-storage.key /etc/pki/tls/private/httpd/httpd-storage.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593101.storage.ooo.test" for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593101.storage.ooo.test Jan 23 03:03:21 localhost certmonger[38946]: " for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593101.storage.ooo.test@OOO.TEST Jan 23 03:03:21 localhost certmonger[38946]: " for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:21 localhost certmonger[38946]: MIIDwjCCAqoCAQAwKDEmMCQGA1UEAxMdbnAwMDA1NTkzMTAxLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[38946]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC/MDQCrxCt8OFQ Jan 23 03:03:21 localhost certmonger[38946]: NfsjZ9Aj3yFHt12eiBN5uClXqIAxjf3JlKY6EEtTkJMhI+ek2ynKwHZtv+NQppxT Jan 23 03:03:21 localhost certmonger[38946]: C51AZ3OjkodHLvFz7nE/2TmYjtBJPKrrb5GSL/xsNEYSO1REz7FmTGjVtmuIxLda Jan 23 03:03:21 localhost certmonger[38946]: qpVOdK+FOn52B/3JuJlp32YDCEAruasTKvD1We3Ezt+PozOEdMi5UavmYbYtjIw5 Jan 23 03:03:21 localhost certmonger[38946]: l3NlX+HIPwr7Lk4l9OVSE7UR6pTpia6DDkzO0z94mVuSY+Sh5vYthm6xwTQOKY8k Jan 23 03:03:21 localhost certmonger[38946]: VB9q0qdeqAy+vxVKd3U9XUOZ6u2ivPCBoe/UDUntyW6qx/v0o5YwZ8/kfdvKJweH Jan 23 03:03:21 localhost certmonger[38946]: 2gUMmqIhAgMBAAGgggFTMCsGCSqGSIb3DQEJFDEeHhwAMgAwADIANgAwADEAMgAz Jan 23 03:03:21 localhost certmonger[38946]: ADAAOAAwADMAMgAxMIIBIgYJKoZIhvcNAQkOMYIBEzCCAQ8wCwYDVR0PBAQDAgWg Jan 23 03:03:21 localhost certmonger[38946]: MIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMS5zdG9yYWdlLm9vby50ZXN0oDsG Jan 23 03:03:21 localhost certmonger[38946]: CisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDEuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[38946]: dEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5URVNUoTAwLqADAgEBoScw Jan 23 03:03:21 localhost certmonger[38946]: JRsESFRUUBsdbnAwMDA1NTkzMTAxLnN0b3JhZ2Uub29vLnRlc3QwHQYDVR0lBBYw Jan 23 03:03:21 localhost certmonger[38946]: FAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFO8M Jan 23 03:03:21 localhost certmonger[38946]: 4FwoUL6fG9RAg/FJ8mi/0yguMA0GCSqGSIb3DQEBCwUAA4IBAQClSs5/6q49U1Yh Jan 23 03:03:21 localhost certmonger[38946]: BHlqR7XvwE0AS8ejOmkfjEC8ATQ5nVUVjVsWiTqa8wmw4UxybduU7SlhszZcGc1K Jan 23 03:03:21 localhost certmonger[38946]: KL+J4Tu5Yhi41QGZTlK9FqfDx2Dm76mTKTHbCA4GhJAKtHIPvM64iBIYzHnjcvWo Jan 23 03:03:21 localhost certmonger[38946]: RlrwnCv3FtOUojOT7gIiCkCXY+d8I9QETzRjtC+PLak1rStRKAtY+dLf1ug+P8Dv Jan 23 03:03:21 localhost certmonger[38946]: wb8ijDQGdS7doPdWoksaVVASPSZhh6kY0bCiAfTmFYuR+vN41/tRnaOTN9T76V7P Jan 23 03:03:21 localhost certmonger[38946]: SaEoFeFObpfxKS/PJFg8hu15jJ3O180DY4IlAX6XeWa4mT+QJAXYw0x+Iz36yneL Jan 23 03:03:21 localhost certmonger[38946]: 3T04Ucq3 Jan 23 03:03:21 localhost certmonger[38946]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:21 localhost certmonger[38946]: " for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvzA0Aq8QrfDhUDX7I2fQI98hR7ddnogTebgpV6iAMY39yZSmOhBLU5CTISPnpNspysB2bb/jUKacUwudQGdzo5KHRy7xc+5xP9k5mI7QSTyq62+Rki/8bDRGEjtURM+xZkxo1bZriMS3WqqVTnSvhTp+dgf9ybiZad9mAwhAK7mrEyrw9VntxM7fj6MzhHTIuVGr5mG2LYyMOZdzZV/hyD8K+y5OJfTlUhO1EeqU6Ymugw5MztM/eJlbkmPkoeb2LYZuscE0DimPJFQfatKnXqgMvr8VSnd1PV1DmertorzwgaHv1A1J7cluqsf79KOWMGfP5H3byicHh9oFDJqiIQIDAQAB" for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:21 localhost certmonger[38946]: 2026-01-23 08:03:21 [38946] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38946]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:21 localhost certmonger[38946]: Certificate: "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" Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Certificate submission still ongoing. Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Certificate submission attempt complete. Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Child status = 0. Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Child output: Jan 23 03:03:21 localhost certmonger[38302]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38302]: MIIFVTCCA72gAwIBAgIRAKJIY6QXs/rsD9wi9xSkUmwwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:21 localhost certmonger[38302]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:21 localhost certmonger[38302]: cml0eTAeFw0yNjAxMjMwODAzMjFaFw0yODAxMjQwODAzMjFaMDsxETAPBgNVBAoM Jan 23 03:03:21 localhost certmonger[38302]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDEuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[38302]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL8wNAKvEK3w4VA1+yNn Jan 23 03:03:21 localhost certmonger[38302]: 0CPfIUe3XZ6IE3m4KVeogDGN/cmUpjoQS1OQkyEj56TbKcrAdm2/41CmnFMLnUBn Jan 23 03:03:21 localhost certmonger[38302]: c6OSh0cu8XPucT/ZOZiO0Ek8qutvkZIv/Gw0RhI7VETPsWZMaNW2a4jEt1qqlU50 Jan 23 03:03:21 localhost certmonger[38302]: r4U6fnYH/cm4mWnfZgMIQCu5qxMq8PVZ7cTO34+jM4R0yLlRq+Zhti2MjDmXc2Vf Jan 23 03:03:21 localhost certmonger[38302]: 4cg/CvsuTiX05VITtRHqlOmJroMOTM7TP3iZW5Jj5KHm9i2GbrHBNA4pjyRUH2rS Jan 23 03:03:21 localhost certmonger[38302]: p16oDL6/FUp3dT1dQ5nq7aK88IGh79QNSe3JbqrH+/SjljBnz+R928onB4faBQya Jan 23 03:03:21 localhost certmonger[38302]: oiECAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:21 localhost certmonger[38302]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38302]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:21 localhost certmonger[38302]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38302]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:21 localhost certmonger[38302]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLxywNtU Jan 23 03:03:21 localhost certmonger[38302]: 34s7gsLnRYe3RhKdNF74MIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMS5zdG9y Jan 23 03:03:21 localhost certmonger[38302]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDEu Jan 23 03:03:21 localhost certmonger[38302]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Jan 23 03:03:21 localhost certmonger[38302]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NTkzMTAxLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[38302]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGImk/q5z7BccdOZxNyFFjN6dYchRTlL Jan 23 03:03:21 localhost certmonger[38302]: BNbioaBWDIo1mcY7w58RfBt553rQS0VjumbTRPjQG3wUlkP8cH4brQEdN+xcq6Mp Jan 23 03:03:21 localhost certmonger[38302]: 3KcyrfWCLIYP3i+TrZjR3UjrTlM/Qfmi/LW+djEwxLg1z+BeHidY8OGQSR+AnJ9V Jan 23 03:03:21 localhost certmonger[38302]: wIwpccZIbJg97K6yFM8WXfn1ociTCq3wvgvwRQJkPSQb581YfLH1ICw2cmvMGd1h Jan 23 03:03:21 localhost certmonger[38302]: sJl8ACghkdZCoegWB2nKGTSA218Zj7RPc1LXWZUfvoeQegm8ObLobKrO+zaZkdUn Jan 23 03:03:21 localhost certmonger[38302]: 1DBkyJt+QiDPDBjFzSPD1STYYY9UbmJwdcPI7fGORVWM1lMPQFLx9GVpWscFV/Xp Jan 23 03:03:21 localhost certmonger[38302]: 0cfE+PnYQrAvDmB4iTFRBO/iltSMu0OB6mQYqxPScle4ALA12NPXFbhcuLOMDZ1/ Jan 23 03:03:21 localhost certmonger[38302]: a93fE8+RUDpI6BCLNtptGA103+2/unIxrUfdUR8bugXop114WWQxZ5R0AEcY99oQ Jan 23 03:03:21 localhost certmonger[38302]: iqY075rr7btG2+08KlgS7Esfka3fA161+g== Jan 23 03:03:21 localhost certmonger[38302]: -----END CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38302]: " Jan 23 03:03:21 localhost certmonger[38949]: 2026-01-23 08:03:21 [38949] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38949]: MIIFVTCCA72gAwIBAgIRAKJIY6QXs/rsD9wi9xSkUmwwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:21 localhost certmonger[38949]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:21 localhost certmonger[38949]: cml0eTAeFw0yNjAxMjMwODAzMjFaFw0yODAxMjQwODAzMjFaMDsxETAPBgNVBAoM Jan 23 03:03:21 localhost certmonger[38949]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDEuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[38949]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL8wNAKvEK3w4VA1+yNn Jan 23 03:03:21 localhost certmonger[38949]: 0CPfIUe3XZ6IE3m4KVeogDGN/cmUpjoQS1OQkyEj56TbKcrAdm2/41CmnFMLnUBn Jan 23 03:03:21 localhost certmonger[38949]: c6OSh0cu8XPucT/ZOZiO0Ek8qutvkZIv/Gw0RhI7VETPsWZMaNW2a4jEt1qqlU50 Jan 23 03:03:21 localhost certmonger[38949]: r4U6fnYH/cm4mWnfZgMIQCu5qxMq8PVZ7cTO34+jM4R0yLlRq+Zhti2MjDmXc2Vf Jan 23 03:03:21 localhost certmonger[38949]: 4cg/CvsuTiX05VITtRHqlOmJroMOTM7TP3iZW5Jj5KHm9i2GbrHBNA4pjyRUH2rS Jan 23 03:03:21 localhost certmonger[38949]: p16oDL6/FUp3dT1dQ5nq7aK88IGh79QNSe3JbqrH+/SjljBnz+R928onB4faBQya Jan 23 03:03:21 localhost certmonger[38949]: oiECAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:21 localhost certmonger[38949]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38949]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:21 localhost certmonger[38949]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38949]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:21 localhost certmonger[38949]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLxywNtU Jan 23 03:03:21 localhost certmonger[38949]: 34s7gsLnRYe3RhKdNF74MIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMS5zdG9y Jan 23 03:03:21 localhost certmonger[38949]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDEu Jan 23 03:03:21 localhost certmonger[38949]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Jan 23 03:03:21 localhost certmonger[38949]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NTkzMTAxLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[38949]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGImk/q5z7BccdOZxNyFFjN6dYchRTlL Jan 23 03:03:21 localhost certmonger[38949]: BNbioaBWDIo1mcY7w58RfBt553rQS0VjumbTRPjQG3wUlkP8cH4brQEdN+xcq6Mp Jan 23 03:03:21 localhost certmonger[38949]: 3KcyrfWCLIYP3i+TrZjR3UjrTlM/Qfmi/LW+djEwxLg1z+BeHidY8OGQSR+AnJ9V Jan 23 03:03:21 localhost certmonger[38949]: wIwpccZIbJg97K6yFM8WXfn1ociTCq3wvgvwRQJkPSQb581YfLH1ICw2cmvMGd1h Jan 23 03:03:21 localhost certmonger[38949]: sJl8ACghkdZCoegWB2nKGTSA218Zj7RPc1LXWZUfvoeQegm8ObLobKrO+zaZkdUn Jan 23 03:03:21 localhost certmonger[38949]: 1DBkyJt+QiDPDBjFzSPD1STYYY9UbmJwdcPI7fGORVWM1lMPQFLx9GVpWscFV/Xp Jan 23 03:03:21 localhost certmonger[38949]: 0cfE+PnYQrAvDmB4iTFRBO/iltSMu0OB6mQYqxPScle4ALA12NPXFbhcuLOMDZ1/ Jan 23 03:03:21 localhost certmonger[38949]: a93fE8+RUDpI6BCLNtptGA103+2/unIxrUfdUR8bugXop114WWQxZ5R0AEcY99oQ Jan 23 03:03:21 localhost certmonger[38949]: iqY075rr7btG2+08KlgS7Esfka3fA161+g== Jan 23 03:03:21 localhost certmonger[38949]: -----END CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38949]: ". Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Certificate submission still ongoing. Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Certificate submission postprocessing complete. Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Child status = 0. Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Child output: Jan 23 03:03:21 localhost certmonger[38302]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFVTCCA72gAwIBAgIRAKJIY6QXs/rsD9wi9xSkUmwwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAxMjMwODAzMjFaFw0yODAxMjQwODAzMjFaMDsxETAPBgNVBAoM\nCE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDEuc3RvcmFnZS5vb28udGVz\ndDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL8wNAKvEK3w4VA1+yNn\n0CPfIUe3XZ6IE3m4KVeogDGN/cmUpjoQS1OQkyEj56TbKcrAdm2/41CmnFMLnUBn\nc6OSh0cu8XPucT/ZOZiO0Ek8qutvkZIv/Gw0RhI7VETPsWZMaNW2a4jEt1qqlU50\nr4U6fnYH/cm4mWnfZgMIQCu5qxMq8PVZ7cTO34+jM4R0yLlRq+Zhti2MjDmXc2Vf\n4cg/CvsuTiX05VITtRHqlOmJroMOTM7TP3iZW5Jj5KHm9i2GbrHBNA4pjyRUH2rS\np16oDL6/FUp3dT1dQ5nq7aK88IGh79QNSe3JbqrH+/SjljBnz+R928onB4faBQya\noiECAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4\nMDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u\ndGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD\nAQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u\ndGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh\nMR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLxywNtU\n34s7gsLnRYe3RhKdNF74MIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMS5zdG9y\nYWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDEu\nc3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U\nRVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NTkzMTAxLnN0b3JhZ2Uub29v\nLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGImk/q5z7BccdOZxNyFFjN6dYchRTlL\nBNbioaBWDIo1mcY7w58RfBt553rQS0VjumbTRPjQG3wUlkP8cH4brQEdN+xcq6Mp\n3KcyrfWCLIYP3i+TrZjR3UjrTlM/Qfmi/LW+djEwxLg1z+BeHidY8OGQSR+AnJ9V\nwIwpccZIbJg97K6yFM8WXfn1ociTCq3wvgvwRQJkPSQb581YfLH1ICw2cmvMGd1h\nsJl8ACghkdZCoegWB2nKGTSA218Zj7RPc1LXWZUfvoeQegm8ObLobKrO+zaZkdUn\n1DBkyJt+QiDPDBjFzSPD1STYYY9UbmJwdcPI7fGORVWM1lMPQFLx9GVpWscFV/Xp\n0cfE+PnYQrAvDmB4iTFRBO/iltSMu0OB6mQYqxPScle4ALA12NPXFbhcuLOMDZ1/\na93fE8+RUDpI6BCLNtptGA103+2/unIxrUfdUR8bugXop114WWQxZ5R0AEcY99oQ\niqY075rr7btG2+08KlgS7Esfka3fA161+g==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:21 localhost certmonger[38302]: " Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38302]: MIIFVTCCA72gAwIBAgIRAKJIY6QXs/rsD9wi9xSkUmwwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:21 localhost certmonger[38302]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:21 localhost certmonger[38302]: cml0eTAeFw0yNjAxMjMwODAzMjFaFw0yODAxMjQwODAzMjFaMDsxETAPBgNVBAoM Jan 23 03:03:21 localhost certmonger[38302]: CE9PTy5URVNUMSYwJAYDVQQDDB1ucDAwMDU1OTMxMDEuc3RvcmFnZS5vb28udGVz Jan 23 03:03:21 localhost certmonger[38302]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL8wNAKvEK3w4VA1+yNn Jan 23 03:03:21 localhost certmonger[38302]: 0CPfIUe3XZ6IE3m4KVeogDGN/cmUpjoQS1OQkyEj56TbKcrAdm2/41CmnFMLnUBn Jan 23 03:03:21 localhost certmonger[38302]: c6OSh0cu8XPucT/ZOZiO0Ek8qutvkZIv/Gw0RhI7VETPsWZMaNW2a4jEt1qqlU50 Jan 23 03:03:21 localhost certmonger[38302]: r4U6fnYH/cm4mWnfZgMIQCu5qxMq8PVZ7cTO34+jM4R0yLlRq+Zhti2MjDmXc2Vf Jan 23 03:03:21 localhost certmonger[38302]: 4cg/CvsuTiX05VITtRHqlOmJroMOTM7TP3iZW5Jj5KHm9i2GbrHBNA4pjyRUH2rS Jan 23 03:03:21 localhost certmonger[38302]: p16oDL6/FUp3dT1dQ5nq7aK88IGh79QNSe3JbqrH+/SjljBnz+R928onB4faBQya Jan 23 03:03:21 localhost certmonger[38302]: oiECAwEAAaOCAdowggHWMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:21 localhost certmonger[38302]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38302]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:21 localhost certmonger[38302]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:21 localhost certmonger[38302]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:21 localhost certmonger[38302]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFLxywNtU Jan 23 03:03:21 localhost certmonger[38302]: 34s7gsLnRYe3RhKdNF74MIGzBgNVHREEgaswgaiCHW5wMDAwNTU5MzEwMS5zdG9y Jan 23 03:03:21 localhost certmonger[38302]: YWdlLm9vby50ZXN0oDsGCisGAQQBgjcUAgOgLQwrSFRUUC9ucDAwMDU1OTMxMDEu Jan 23 03:03:21 localhost certmonger[38302]: c3RvcmFnZS5vb28udGVzdEBPT08uVEVTVKBKBgYrBgEFAgKgQDA+oAobCE9PTy5U Jan 23 03:03:21 localhost certmonger[38302]: RVNUoTAwLqADAgEBoScwJRsESFRUUBsdbnAwMDA1NTkzMTAxLnN0b3JhZ2Uub29v Jan 23 03:03:21 localhost certmonger[38302]: LnRlc3QwDQYJKoZIhvcNAQELBQADggGBAGImk/q5z7BccdOZxNyFFjN6dYchRTlL Jan 23 03:03:21 localhost certmonger[38302]: BNbioaBWDIo1mcY7w58RfBt553rQS0VjumbTRPjQG3wUlkP8cH4brQEdN+xcq6Mp Jan 23 03:03:21 localhost certmonger[38302]: 3KcyrfWCLIYP3i+TrZjR3UjrTlM/Qfmi/LW+djEwxLg1z+BeHidY8OGQSR+AnJ9V Jan 23 03:03:21 localhost certmonger[38302]: wIwpccZIbJg97K6yFM8WXfn1ociTCq3wvgvwRQJkPSQb581YfLH1ICw2cmvMGd1h Jan 23 03:03:21 localhost certmonger[38302]: sJl8ACghkdZCoegWB2nKGTSA218Zj7RPc1LXWZUfvoeQegm8ObLobKrO+zaZkdUn Jan 23 03:03:21 localhost certmonger[38302]: 1DBkyJt+QiDPDBjFzSPD1STYYY9UbmJwdcPI7fGORVWM1lMPQFLx9GVpWscFV/Xp Jan 23 03:03:21 localhost certmonger[38302]: 0cfE+PnYQrAvDmB4iTFRBO/iltSMu0OB6mQYqxPScle4ALA12NPXFbhcuLOMDZ1/ Jan 23 03:03:21 localhost certmonger[38302]: a93fE8+RUDpI6BCLNtptGA103+2/unIxrUfdUR8bugXop114WWQxZ5R0AEcY99oQ Jan 23 03:03:21 localhost certmonger[38302]: iqY075rr7btG2+08KlgS7Esfka3fA161+g== Jan 23 03:03:21 localhost certmonger[38302]: -----END CERTIFICATE----- Jan 23 03:03:21 localhost certmonger[38302]: ". Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] No hooks set for pre-save command. Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost certmonger[38957]: Certificate in file "/etc/pki/tls/certs/httpd-storage.crt" issued by CA and saved. Jan 23 03:03:21 localhost certmonger[38302]: 2026-01-23 08:03:21 [38302] Wrote to /var/lib/certmonger/requests/20260123080321 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:21 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost python3[38973]: ansible-certificate_request Invoked with name=httpd-storage_mgmt dns=['np0005593101.storagemgmt.ooo.test'] principal=['HTTP/np0005593101.storagemgmt.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-storage_mgmt.crt /etc/pki/tls/certs/httpd/httpd-storage_mgmt.crt#012cp /etc/pki/tls/private/httpd-storage_mgmt.key /etc/pki/tls/private/httpd/httpd-storage_mgmt.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593101.storagemgmt.ooo.test" for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593101.storagemgmt.ooo.test Jan 23 03:03:22 localhost certmonger[38983]: " for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593101.storagemgmt.ooo.test@OOO.TEST Jan 23 03:03:22 localhost certmonger[38983]: " for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:22 localhost certmonger[38983]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAxLnN0b3JhZ2VtZ210 Jan 23 03:03:22 localhost certmonger[38983]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2WIfF5/I Jan 23 03:03:22 localhost certmonger[38983]: x7AkBSqsDuLkpv4zP4u/bpDCyv0rdYkMMGTMaW3lUTh2IjasNeUyasFFGDocDD+S Jan 23 03:03:22 localhost certmonger[38983]: NazvhidsADZQUhsbo5+ESHxVUMZJpWIC5KxTDOXzixsV5/fBa2kx3QL6FNOHtr/Y Jan 23 03:03:22 localhost certmonger[38983]: Kzo/mZ8TQd1bwABQSDDnv7z8/SGUpvdWJwKuqpvHVN80TNZv9MqSupb2JLrH/Wmj Jan 23 03:03:22 localhost certmonger[38983]: J9Er27jRUluRCIvsJ6jRjizrSMnZaE/bln4Q7w2jm//ikM1VAdgHx1U8TFbBMjP0 Jan 23 03:03:22 localhost certmonger[38983]: xFjzhn0WbyfVDXA9zLPJb3RBkmUMyoDpQcSJyg7ErBmBMTRdVLuPmb/I8I3fafAD Jan 23 03:03:22 localhost certmonger[38983]: iyj8aguUKpXR3wIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 03:03:22 localhost certmonger[38983]: ADIAMwAwADgAMAAzADIAMjCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Jan 23 03:03:22 localhost certmonger[38983]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDEuc3RvcmFnZW1nbXQub29v Jan 23 03:03:22 localhost certmonger[38983]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU5MzEwMS5zdG9yYWdl Jan 23 03:03:22 localhost certmonger[38983]: bWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Jan 23 03:03:22 localhost certmonger[38983]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAxLnN0b3JhZ2VtZ210Lm9v Jan 23 03:03:22 localhost certmonger[38983]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Jan 23 03:03:22 localhost certmonger[38983]: AjAAMB0GA1UdDgQWBBR0Q6UOXewcKGNTJfHyPhTV2unzVTANBgkqhkiG9w0BAQsF Jan 23 03:03:22 localhost certmonger[38983]: AAOCAQEAYUrx9UYTPEJyey8vbXBmchepSxv9DPjMNbFN2LB0gYLTTOV+ztdB4MRH Jan 23 03:03:22 localhost certmonger[38983]: EyOsm18+xNKIENxR/FgF27BGZHTTj2rs3xg5uUuOe881uH1hx7BltwRJpYrlmCZI Jan 23 03:03:22 localhost certmonger[38983]: j1uJzT1HaHJSCvtg2VICspL7sqCDS/L2ccD9dlmmLAq0bdU6S+9wNApY4cF/aANV Jan 23 03:03:22 localhost certmonger[38983]: njDstXU3jrag13R7TETOZ45Ou3jYSJZDuOXZR089P+8HGZe/PO8N6BCw/WJIFVOd Jan 23 03:03:22 localhost certmonger[38983]: 7aSN45q2V5+Hv1+5nQ5QBpCroeNORLJnV0AxezCbar721+0mLbCcdZu/poJYeDnO Jan 23 03:03:22 localhost certmonger[38983]: aQRs/ElXYB0uTaNG7+K125NrPYDgfw== Jan 23 03:03:22 localhost certmonger[38983]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:22 localhost certmonger[38983]: " for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2WIfF5/Ix7AkBSqsDuLkpv4zP4u/bpDCyv0rdYkMMGTMaW3lUTh2IjasNeUyasFFGDocDD+SNazvhidsADZQUhsbo5+ESHxVUMZJpWIC5KxTDOXzixsV5/fBa2kx3QL6FNOHtr/YKzo/mZ8TQd1bwABQSDDnv7z8/SGUpvdWJwKuqpvHVN80TNZv9MqSupb2JLrH/WmjJ9Er27jRUluRCIvsJ6jRjizrSMnZaE/bln4Q7w2jm//ikM1VAdgHx1U8TFbBMjP0xFjzhn0WbyfVDXA9zLPJb3RBkmUMyoDpQcSJyg7ErBmBMTRdVLuPmb/I8I3fafADiyj8aguUKpXR3wIDAQAB" for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:22 localhost certmonger[38983]: 2026-01-23 08:03:22 [38983] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:22 localhost certmonger[38302]: 2026-01-23 08:03:22 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:22 localhost certmonger[38983]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:22 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[38983]: Certificate: "MIIFZTCCA82gAwIBAgIRANfIuhPgP2FSnv3aPEFmMwwwDQYJKoZIhvcNAQELBQAwMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhvcml0eTAeFw0yNjAxMjMwODAzMjNaFw0yODAxMjQwODAzMjNaMD8xETAPBgNVBAoMCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDEuc3RvcmFnZW1nbXQub29vLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZYh8Xn8jHsCQFKqwO4uSm/jM/i79ukMLK/St1iQwwZMxpbeVROHYiNqw15TJqwUUYOhwMP5I1rO+GJ2wANlBSGxujn4RIfFVQxkmlYgLkrFMM5fOLGxXn98FraTHdAvoU04e2v9grOj+ZnxNB3VvAAFBIMOe/vPz9IZSm91YnAq6qm8dU3zRM1m/0ypK6lvYkusf9aaMn0SvbuNFSW5EIi+wnqNGOLOtIydloT9uWfhDvDaOb/+KQzVUB2AfHVTxMVsEyM/TEWPOGfRZvJ9UNcD3Ms8lvdEGSZQzKgOlBxInKDsSsGYExNF1Uu4+Zv8jwjd9p8AOLKPxqC5QqldHfAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qtdyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eub29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVpcGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR/wQHB1akRmx7aD2dnp5ZLm4Pm3zCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDEuc3RvcmFnZW1nbXQub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU5MzEwMS5zdG9yYWdlbWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAxLnN0b3JhZ2VtZ210Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA0D2ISpw45SJyPxSUvpQkVEKZZRSoBC0EXX+5Rr+V/UvlhlnQHCNbKtErJtH2Nc+gtCDFQUELQr4NWbaAdDxU/A/SAY+YjHD9nFjhWGcvIRFX8HCxlwLf9QQS+Av2c9+3h1pEYDOjPOxFz3C5nY8Gn/bbiv/cArJThoXhG3IauaKnsHonO04V6S+CiCLXM+4NOtqe12iuCesuYZGUlcg99G2EJIX6zR53Va3wRqJtwZEWoQoDgJvU8ImgsedrR+5ViTFYmZt3z82EVzwViVi+IWJxX+oJ361qUhsg3Q6uVHzanRgfA2Lp/8Vw06gL5MxrS84iSjLI892irNTweggPc7U0RxEN154X+QsfAzIaOsenWRvfJyUpbdr9SlRxZvU2HohnrPtoUNxXuG8asspRhDabzHwrhaIUApwJAzHQK/6UBTfR+g0aPgq5MB+4yWuc4A/AHicnPaWbxDS8O61HoJWHfq06Ueh9D56JCgf2roQHoVHZLPs2skVodAQwF758=" Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Certificate submission still ongoing. Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Certificate submission attempt complete. Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Child status = 0. Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Child output: Jan 23 03:03:23 localhost certmonger[38302]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38302]: MIIFZTCCA82gAwIBAgIRANfIuhPgP2FSnv3aPEFmMwwwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:23 localhost certmonger[38302]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:23 localhost certmonger[38302]: cml0eTAeFw0yNjAxMjMwODAzMjNaFw0yODAxMjQwODAzMjNaMD8xETAPBgNVBAoM Jan 23 03:03:23 localhost certmonger[38302]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDEuc3RvcmFnZW1nbXQub29v Jan 23 03:03:23 localhost certmonger[38302]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZYh8Xn8jHsCQF Jan 23 03:03:23 localhost certmonger[38302]: KqwO4uSm/jM/i79ukMLK/St1iQwwZMxpbeVROHYiNqw15TJqwUUYOhwMP5I1rO+G Jan 23 03:03:23 localhost certmonger[38302]: J2wANlBSGxujn4RIfFVQxkmlYgLkrFMM5fOLGxXn98FraTHdAvoU04e2v9grOj+Z Jan 23 03:03:23 localhost certmonger[38302]: nxNB3VvAAFBIMOe/vPz9IZSm91YnAq6qm8dU3zRM1m/0ypK6lvYkusf9aaMn0Svb Jan 23 03:03:23 localhost certmonger[38302]: uNFSW5EIi+wnqNGOLOtIydloT9uWfhDvDaOb/+KQzVUB2AfHVTxMVsEyM/TEWPOG Jan 23 03:03:23 localhost certmonger[38302]: fRZvJ9UNcD3Ms8lvdEGSZQzKgOlBxInKDsSsGYExNF1Uu4+Zv8jwjd9p8AOLKPxq Jan 23 03:03:23 localhost certmonger[38302]: C5QqldHfAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:23 localhost certmonger[38302]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:23 localhost certmonger[38302]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:23 localhost certmonger[38302]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:23 localhost certmonger[38302]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:23 localhost certmonger[38302]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR/ Jan 23 03:03:23 localhost certmonger[38302]: wQHB1akRmx7aD2dnp5ZLm4Pm3zCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDEu Jan 23 03:03:23 localhost certmonger[38302]: c3RvcmFnZW1nbXQub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:23 localhost certmonger[38302]: NTU5MzEwMS5zdG9yYWdlbWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:23 localhost certmonger[38302]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAx Jan 23 03:03:23 localhost certmonger[38302]: LnN0b3JhZ2VtZ210Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA0D2ISpw45 Jan 23 03:03:23 localhost certmonger[38302]: SJyPxSUvpQkVEKZZRSoBC0EXX+5Rr+V/UvlhlnQHCNbKtErJtH2Nc+gtCDFQUELQ Jan 23 03:03:23 localhost certmonger[38302]: r4NWbaAdDxU/A/SAY+YjHD9nFjhWGcvIRFX8HCxlwLf9QQS+Av2c9+3h1pEYDOjP Jan 23 03:03:23 localhost certmonger[38302]: OxFz3C5nY8Gn/bbiv/cArJThoXhG3IauaKnsHonO04V6S+CiCLXM+4NOtqe12iuC Jan 23 03:03:23 localhost certmonger[38302]: esuYZGUlcg99G2EJIX6zR53Va3wRqJtwZEWoQoDgJvU8ImgsedrR+5ViTFYmZt3z Jan 23 03:03:23 localhost certmonger[38302]: 82EVzwViVi+IWJxX+oJ361qUhsg3Q6uVHzanRgfA2Lp/8Vw06gL5MxrS84iSjLI8 Jan 23 03:03:23 localhost certmonger[38302]: 92irNTweggPc7U0RxEN154X+QsfAzIaOsenWRvfJyUpbdr9SlRxZvU2HohnrPtoU Jan 23 03:03:23 localhost certmonger[38302]: NxXuG8asspRhDabzHwrhaIUApwJAzHQK/6UBTfR+g0aPgq5MB+4yWuc4A/AHicnP Jan 23 03:03:23 localhost certmonger[38302]: aWbxDS8O61HoJWHfq06Ueh9D56JCgf2roQHoVHZLPs2skVodAQwF758= Jan 23 03:03:23 localhost certmonger[38302]: -----END CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38302]: " Jan 23 03:03:23 localhost certmonger[38985]: 2026-01-23 08:03:23 [38985] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38985]: MIIFZTCCA82gAwIBAgIRANfIuhPgP2FSnv3aPEFmMwwwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:23 localhost certmonger[38985]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:23 localhost certmonger[38985]: cml0eTAeFw0yNjAxMjMwODAzMjNaFw0yODAxMjQwODAzMjNaMD8xETAPBgNVBAoM Jan 23 03:03:23 localhost certmonger[38985]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDEuc3RvcmFnZW1nbXQub29v Jan 23 03:03:23 localhost certmonger[38985]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZYh8Xn8jHsCQF Jan 23 03:03:23 localhost certmonger[38985]: KqwO4uSm/jM/i79ukMLK/St1iQwwZMxpbeVROHYiNqw15TJqwUUYOhwMP5I1rO+G Jan 23 03:03:23 localhost certmonger[38985]: J2wANlBSGxujn4RIfFVQxkmlYgLkrFMM5fOLGxXn98FraTHdAvoU04e2v9grOj+Z Jan 23 03:03:23 localhost certmonger[38985]: nxNB3VvAAFBIMOe/vPz9IZSm91YnAq6qm8dU3zRM1m/0ypK6lvYkusf9aaMn0Svb Jan 23 03:03:23 localhost certmonger[38985]: uNFSW5EIi+wnqNGOLOtIydloT9uWfhDvDaOb/+KQzVUB2AfHVTxMVsEyM/TEWPOG Jan 23 03:03:23 localhost certmonger[38985]: fRZvJ9UNcD3Ms8lvdEGSZQzKgOlBxInKDsSsGYExNF1Uu4+Zv8jwjd9p8AOLKPxq Jan 23 03:03:23 localhost certmonger[38985]: C5QqldHfAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:23 localhost certmonger[38985]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:23 localhost certmonger[38985]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:23 localhost certmonger[38985]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:23 localhost certmonger[38985]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:23 localhost certmonger[38985]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR/ Jan 23 03:03:23 localhost certmonger[38985]: wQHB1akRmx7aD2dnp5ZLm4Pm3zCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDEu Jan 23 03:03:23 localhost certmonger[38985]: c3RvcmFnZW1nbXQub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:23 localhost certmonger[38985]: NTU5MzEwMS5zdG9yYWdlbWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:23 localhost certmonger[38985]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAx Jan 23 03:03:23 localhost certmonger[38985]: LnN0b3JhZ2VtZ210Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA0D2ISpw45 Jan 23 03:03:23 localhost certmonger[38985]: SJyPxSUvpQkVEKZZRSoBC0EXX+5Rr+V/UvlhlnQHCNbKtErJtH2Nc+gtCDFQUELQ Jan 23 03:03:23 localhost certmonger[38985]: r4NWbaAdDxU/A/SAY+YjHD9nFjhWGcvIRFX8HCxlwLf9QQS+Av2c9+3h1pEYDOjP Jan 23 03:03:23 localhost certmonger[38985]: OxFz3C5nY8Gn/bbiv/cArJThoXhG3IauaKnsHonO04V6S+CiCLXM+4NOtqe12iuC Jan 23 03:03:23 localhost certmonger[38985]: esuYZGUlcg99G2EJIX6zR53Va3wRqJtwZEWoQoDgJvU8ImgsedrR+5ViTFYmZt3z Jan 23 03:03:23 localhost certmonger[38985]: 82EVzwViVi+IWJxX+oJ361qUhsg3Q6uVHzanRgfA2Lp/8Vw06gL5MxrS84iSjLI8 Jan 23 03:03:23 localhost certmonger[38985]: 92irNTweggPc7U0RxEN154X+QsfAzIaOsenWRvfJyUpbdr9SlRxZvU2HohnrPtoU Jan 23 03:03:23 localhost certmonger[38985]: NxXuG8asspRhDabzHwrhaIUApwJAzHQK/6UBTfR+g0aPgq5MB+4yWuc4A/AHicnP Jan 23 03:03:23 localhost certmonger[38985]: aWbxDS8O61HoJWHfq06Ueh9D56JCgf2roQHoVHZLPs2skVodAQwF758= Jan 23 03:03:23 localhost certmonger[38985]: -----END CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38985]: ". Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Certificate submission still ongoing. Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Certificate submission postprocessing complete. Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Child status = 0. Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Child output: Jan 23 03:03:23 localhost certmonger[38302]: "{"certificate":"-----BEGIN CERTIFICATE-----\nMIIFZTCCA82gAwIBAgIRANfIuhPgP2FSnv3aPEFmMwwwDQYJKoZIhvcNAQELBQAw\nMzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv\ncml0eTAeFw0yNjAxMjMwODAzMjNaFw0yODAxMjQwODAzMjNaMD8xETAPBgNVBAoM\nCE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDEuc3RvcmFnZW1nbXQub29v\nLnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZYh8Xn8jHsCQF\nKqwO4uSm/jM/i79ukMLK/St1iQwwZMxpbeVROHYiNqw15TJqwUUYOhwMP5I1rO+G\nJ2wANlBSGxujn4RIfFVQxkmlYgLkrFMM5fOLGxXn98FraTHdAvoU04e2v9grOj+Z\nnxNB3VvAAFBIMOe/vPz9IZSm91YnAq6qm8dU3zRM1m/0ypK6lvYkusf9aaMn0Svb\nuNFSW5EIi+wnqNGOLOtIydloT9uWfhDvDaOb/+KQzVUB2AfHVTxMVsEyM/TEWPOG\nfRZvJ9UNcD3Ms8lvdEGSZQzKgOlBxInKDsSsGYExNF1Uu4+Zv8jwjd9p8AOLKPxq\nC5QqldHfAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt\ndyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB\nBQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu\nb29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp\ncGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR/\nwQHB1akRmx7aD2dnp5ZLm4Pm3zCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDEu\nc3RvcmFnZW1nbXQub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw\nNTU5MzEwMS5zdG9yYWdlbWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg\nRDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAx\nLnN0b3JhZ2VtZ210Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA0D2ISpw45\nSJyPxSUvpQkVEKZZRSoBC0EXX+5Rr+V/UvlhlnQHCNbKtErJtH2Nc+gtCDFQUELQ\nr4NWbaAdDxU/A/SAY+YjHD9nFjhWGcvIRFX8HCxlwLf9QQS+Av2c9+3h1pEYDOjP\nOxFz3C5nY8Gn/bbiv/cArJThoXhG3IauaKnsHonO04V6S+CiCLXM+4NOtqe12iuC\nesuYZGUlcg99G2EJIX6zR53Va3wRqJtwZEWoQoDgJvU8ImgsedrR+5ViTFYmZt3z\n82EVzwViVi+IWJxX+oJ361qUhsg3Q6uVHzanRgfA2Lp/8Vw06gL5MxrS84iSjLI8\n92irNTweggPc7U0RxEN154X+QsfAzIaOsenWRvfJyUpbdr9SlRxZvU2HohnrPtoU\nNxXuG8asspRhDabzHwrhaIUApwJAzHQK/6UBTfR+g0aPgq5MB+4yWuc4A/AHicnP\naWbxDS8O61HoJWHfq06Ueh9D56JCgf2roQHoVHZLPs2skVodAQwF758=\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:23 localhost certmonger[38302]: " Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38302]: MIIFZTCCA82gAwIBAgIRANfIuhPgP2FSnv3aPEFmMwwwDQYJKoZIhvcNAQELBQAw Jan 23 03:03:23 localhost certmonger[38302]: MzERMA8GA1UECgwIT09PLlRFU1QxHjAcBgNVBAMMFUNlcnRpZmljYXRlIEF1dGhv Jan 23 03:03:23 localhost certmonger[38302]: cml0eTAeFw0yNjAxMjMwODAzMjNaFw0yODAxMjQwODAzMjNaMD8xETAPBgNVBAoM Jan 23 03:03:23 localhost certmonger[38302]: CE9PTy5URVNUMSowKAYDVQQDDCFucDAwMDU1OTMxMDEuc3RvcmFnZW1nbXQub29v Jan 23 03:03:23 localhost certmonger[38302]: LnRlc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZYh8Xn8jHsCQF Jan 23 03:03:23 localhost certmonger[38302]: KqwO4uSm/jM/i79ukMLK/St1iQwwZMxpbeVROHYiNqw15TJqwUUYOhwMP5I1rO+G Jan 23 03:03:23 localhost certmonger[38302]: J2wANlBSGxujn4RIfFVQxkmlYgLkrFMM5fOLGxXn98FraTHdAvoU04e2v9grOj+Z Jan 23 03:03:23 localhost certmonger[38302]: nxNB3VvAAFBIMOe/vPz9IZSm91YnAq6qm8dU3zRM1m/0ypK6lvYkusf9aaMn0Svb Jan 23 03:03:23 localhost certmonger[38302]: uNFSW5EIi+wnqNGOLOtIydloT9uWfhDvDaOb/+KQzVUB2AfHVTxMVsEyM/TEWPOG Jan 23 03:03:23 localhost certmonger[38302]: fRZvJ9UNcD3Ms8lvdEGSZQzKgOlBxInKDsSsGYExNF1Uu4+Zv8jwjd9p8AOLKPxq Jan 23 03:03:23 localhost certmonger[38302]: C5QqldHfAgMBAAGjggHmMIIB4jAfBgNVHSMEGDAWgBT2ud9P+VR9cz2UoZLT61qt Jan 23 03:03:23 localhost certmonger[38302]: dyzyODA6BggrBgEFBQcBAQQuMCwwKgYIKwYBBQUHMAGGHmh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:23 localhost certmonger[38302]: b29vLnRlc3QvY2Evb2NzcDAOBgNVHQ8BAf8EBAMCBPAwHQYDVR0lBBYwFAYIKwYB Jan 23 03:03:23 localhost certmonger[38302]: BQUHAwEGCCsGAQUFBwMCMHMGA1UdHwRsMGowaKAwoC6GLGh0dHA6Ly9pcGEtY2Eu Jan 23 03:03:23 localhost certmonger[38302]: b29vLnRlc3QvaXBhL2NybC9NYXN0ZXJDUkwuYmluojSkMjAwMQ4wDAYDVQQKDAVp Jan 23 03:03:23 localhost certmonger[38302]: cGFjYTEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9yaXR5MB0GA1UdDgQWBBR/ Jan 23 03:03:23 localhost certmonger[38302]: wQHB1akRmx7aD2dnp5ZLm4Pm3zCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDEu Jan 23 03:03:23 localhost certmonger[38302]: c3RvcmFnZW1nbXQub29vLnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAw Jan 23 03:03:23 localhost certmonger[38302]: NTU5MzEwMS5zdG9yYWdlbWdtdC5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKg Jan 23 03:03:23 localhost certmonger[38302]: RDBCoAobCE9PTy5URVNUoTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAx Jan 23 03:03:23 localhost certmonger[38302]: LnN0b3JhZ2VtZ210Lm9vby50ZXN0MA0GCSqGSIb3DQEBCwUAA4IBgQA0D2ISpw45 Jan 23 03:03:23 localhost certmonger[38302]: SJyPxSUvpQkVEKZZRSoBC0EXX+5Rr+V/UvlhlnQHCNbKtErJtH2Nc+gtCDFQUELQ Jan 23 03:03:23 localhost certmonger[38302]: r4NWbaAdDxU/A/SAY+YjHD9nFjhWGcvIRFX8HCxlwLf9QQS+Av2c9+3h1pEYDOjP Jan 23 03:03:23 localhost certmonger[38302]: OxFz3C5nY8Gn/bbiv/cArJThoXhG3IauaKnsHonO04V6S+CiCLXM+4NOtqe12iuC Jan 23 03:03:23 localhost certmonger[38302]: esuYZGUlcg99G2EJIX6zR53Va3wRqJtwZEWoQoDgJvU8ImgsedrR+5ViTFYmZt3z Jan 23 03:03:23 localhost certmonger[38302]: 82EVzwViVi+IWJxX+oJ361qUhsg3Q6uVHzanRgfA2Lp/8Vw06gL5MxrS84iSjLI8 Jan 23 03:03:23 localhost certmonger[38302]: 92irNTweggPc7U0RxEN154X+QsfAzIaOsenWRvfJyUpbdr9SlRxZvU2HohnrPtoU Jan 23 03:03:23 localhost certmonger[38302]: NxXuG8asspRhDabzHwrhaIUApwJAzHQK/6UBTfR+g0aPgq5MB+4yWuc4A/AHicnP Jan 23 03:03:23 localhost certmonger[38302]: aWbxDS8O61HoJWHfq06Ueh9D56JCgf2roQHoVHZLPs2skVodAQwF758= Jan 23 03:03:23 localhost certmonger[38302]: -----END CERTIFICATE----- Jan 23 03:03:23 localhost certmonger[38302]: ". Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] No hooks set for pre-save command. Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost certmonger[38993]: Certificate in file "/etc/pki/tls/certs/httpd-storage_mgmt.crt" issued by CA and saved. Jan 23 03:03:23 localhost certmonger[38302]: 2026-01-23 08:03:23 [38302] Wrote to /var/lib/certmonger/requests/20260123080322 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:23 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost python3[39009]: ansible-certificate_request Invoked with name=httpd-internal_api dns=['np0005593101.internalapi.ooo.test'] principal=['HTTP/np0005593101.internalapi.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-internal_api.crt /etc/pki/tls/certs/httpd/httpd-internal_api.crt#012cp /etc/pki/tls/private/httpd-internal_api.key /etc/pki/tls/private/httpd/httpd-internal_api.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593101.internalapi.ooo.test" for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593101.internalapi.ooo.test Jan 23 03:03:24 localhost certmonger[39019]: " for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593101.internalapi.ooo.test@OOO.TEST Jan 23 03:03:24 localhost certmonger[39019]: " for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:24 localhost certmonger[39019]: MIID0jCCAroCAQAwLDEqMCgGA1UEAxMhbnAwMDA1NTkzMTAxLmludGVybmFsYXBp Jan 23 03:03:24 localhost certmonger[39019]: Lm9vby50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1WnYYHTe Jan 23 03:03:24 localhost certmonger[39019]: ZH3SCqGs+TAJ+NlIN6LsnyLyS6sgS2DkzRQnX6MCq3EOFbW/LzAf58FN6yQ9Yhi0 Jan 23 03:03:24 localhost certmonger[39019]: CiQY3/GJDhoeryq3EDdT6kfBGF8YLfLSFXMnNPGKx0J6Te2O9ILSQa0cwXLg68l+ Jan 23 03:03:24 localhost certmonger[39019]: eCJe3Dst945Al2m+7PHWnEJ/RB45W1xVWkiwF2fCfbI1tlbdhqbYyZy55z2bhLd8 Jan 23 03:03:24 localhost certmonger[39019]: cYP/bwl0KDtD09t/83BSYM0PKtEMKQ8gOAKJVt4vOFlOkLtUPyDZnAjCmOZ0dBJZ Jan 23 03:03:24 localhost certmonger[39019]: BI48komtM7T1maGZsUJvg4axK7RzYN8gfCvpC3LA+LPV4tSkTDrr/51ZjciXR1wt Jan 23 03:03:24 localhost certmonger[39019]: v9KrB4OZUEwqrwIDAQABoIIBXzArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAx Jan 23 03:03:24 localhost certmonger[39019]: ADIAMwAwADgAMAAzADIANDCCAS4GCSqGSIb3DQEJDjGCAR8wggEbMAsGA1UdDwQE Jan 23 03:03:24 localhost certmonger[39019]: AwIFoDCBvwYDVR0RBIG3MIG0giFucDAwMDU1OTMxMDEuaW50ZXJuYWxhcGkub29v Jan 23 03:03:24 localhost certmonger[39019]: LnRlc3SgPwYKKwYBBAGCNxQCA6AxDC9IVFRQL25wMDAwNTU5MzEwMS5pbnRlcm5h Jan 23 03:03:24 localhost certmonger[39019]: bGFwaS5vb28udGVzdEBPT08uVEVTVKBOBgYrBgEFAgKgRDBCoAobCE9PTy5URVNU Jan 23 03:03:24 localhost certmonger[39019]: oTQwMqADAgEBoSswKRsESFRUUBshbnAwMDA1NTkzMTAxLmludGVybmFsYXBpLm9v Jan 23 03:03:24 localhost certmonger[39019]: by50ZXN0MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E Jan 23 03:03:24 localhost certmonger[39019]: AjAAMB0GA1UdDgQWBBRwxyTqFUDgAZdgOkdqRItrr4RxkDANBgkqhkiG9w0BAQsF Jan 23 03:03:24 localhost certmonger[39019]: AAOCAQEAtIieMQYi3QvHKbbconosVYJA7VmSbjV2JsLuERi4DLw9GdtNW2sJSLti Jan 23 03:03:24 localhost certmonger[39019]: yoQGbs/9Zz/IAvQt2LNzJbbIgzWSy2sQ1Mg5kAn+u8aT/UffuXVLvn0Y7cXK1hUW Jan 23 03:03:24 localhost certmonger[39019]: 9vVVKN8TgVowIOWOOCkui4YBqpcFweQJ2+rTpbhtMVTn5eXYYHSqV/rSd4IH8+gt Jan 23 03:03:24 localhost certmonger[39019]: kokdJnSEXXwSh0aM9G9ObmZCk/z3mKwbcc+kOhIh2ikyeTCXxJveOp/V77nyQkYy Jan 23 03:03:24 localhost certmonger[39019]: Fj6A1+riRnNKONsnCjWQijmEUkwo8eTi6NELw+omKcbsejtCp695HeAKONrqF1Kn Jan 23 03:03:24 localhost certmonger[39019]: OGd5fotwmSLCoHguWbMjm1PUNuEDqQ== Jan 23 03:03:24 localhost certmonger[39019]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:24 localhost certmonger[39019]: " for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_SPKAC" to "MIICQDCCASgwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDVadhgdN5kfdIKoaz5MAn42Ug3ouyfIvJLqyBLYOTNFCdfowKrcQ4Vtb8vMB/nwU3rJD1iGLQKJBjf8YkOGh6vKrcQN1PqR8EYXxgt8tIVcyc08YrHQnpN7Y70gtJBrRzBcuDryX54Il7cOy33jkCXab7s8dacQn9EHjlbXFVaSLAXZ8J9sjW2Vt2GptjJnLnnPZuEt3xxg/9vCXQoO0PT23/zcFJgzQ8q0QwpDyA4AolW3i84WU6Qu1Q/INmcCMKY5nR0ElkEjjySia0ztPWZoZmxQm+DhrErtHNg3yB8K+kLcsD4s9Xi1KRMOuv/nVmNyJdHXC2/0qsHg5lQTCqvAgMBAAEWADANBgkqhkiG9w0BAQsFAAOCAQEARi8ZiRiNSyesAz5+IQo5GQPDlJtldirj+nLrk0hhRMUJe31HC25aQ9H/WpYGYRiPbuBOZxAfafqwVNLfFmsnYnRHQKrXqRJwSNqnim7q2r28mIRnNH9h91WB/i6pSy/7JVqPGZoXHtMv+Rz1EPbA3R21nKp2piSvt2SdVTryVJhL++39ItdbGCrhHKgIwVgNtUEWmlDKaCxho/3Quu7o6Xn3Pqg+EzXAjaT7mKPNcY1owElwv1jtLwcprlBUKEwfOAPCGoJsB3pDF+f46ygXpqcSXrn3DZV/AifoLgWsgZ2UvwqAFQnAu4GuJ7xLmKBaDO/8tvKNuUs5A51FgHYfxA==" for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1WnYYHTeZH3SCqGs+TAJ+NlIN6LsnyLyS6sgS2DkzRQnX6MCq3EOFbW/LzAf58FN6yQ9Yhi0CiQY3/GJDhoeryq3EDdT6kfBGF8YLfLSFXMnNPGKx0J6Te2O9ILSQa0cwXLg68l+eCJe3Dst945Al2m+7PHWnEJ/RB45W1xVWkiwF2fCfbI1tlbdhqbYyZy55z2bhLd8cYP/bwl0KDtD09t/83BSYM0PKtEMKQ8gOAKJVt4vOFlOkLtUPyDZnAjCmOZ0dBJZBI48komtM7T1maGZsUJvg4axK7RzYN8gfCvpC3LA+LPV4tSkTDrr/51ZjciXR1wtv9KrB4OZUEwqrwIDAQAB" for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:24 localhost certmonger[39019]: 2026-01-23 08:03:24 [39019] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:24 localhost certmonger[38302]: 2026-01-23 08:03:24 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost certmonger[39019]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:24 localhost ipa-submit[39019]: JSON-RPC error: 4001: The host 'np0005593101.internalapi.ooo.test' does not exist to add a service to. Jan 23 03:03:24 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Certificate submission still ongoing. Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Certificate submission attempt complete. Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Child status = 3. Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Child output: Jan 23 03:03:25 localhost certmonger[38302]: "Server at https://ipa.ooo.test/ipa/json failed request, will retry: 4001 (The host 'np0005593101.internalapi.ooo.test' does not exist to add a service to.). Jan 23 03:03:25 localhost certmonger[38302]: " Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Server at https://ipa.ooo.test/ipa/json failed request, will retry: 4001 (The host 'np0005593101.internalapi.ooo.test' does not exist to add a service to.). Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Certificate not (yet?) issued. Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080324 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost python3[39036]: ansible-certificate_request Invoked with name=httpd-external dns=['np0005593101.external.ooo.test'] principal=['HTTP/np0005593101.external.ooo.test@OOO.TEST'] directory=/etc/pki/tls key_size=2048 wait=True run_after=cp /etc/pki/tls/certs/httpd-external.crt /etc/pki/tls/certs/httpd/httpd-external.crt#012cp /etc/pki/tls/private/httpd-external.key /etc/pki/tls/private/httpd/httpd-external.key#012pkill -USR1 httpd#012 ca=ipa __header=##012# Ansible managed#012##012 provider_config_directory=/etc/certmonger provider=certmonger key_usage=['digitalSignature', 'keyEncipherment'] extended_key_usage=['id-kp-serverAuth', 'id-kp-clientAuth'] auto_renew=True ip=None email=None common_name=None country=None state=None locality=None organization=None organizational_unit=None contact_email=None owner=None group=None run_before=None Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5aa1d121-f66f-4d6d-bc9f-c5f613ea2e0c Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5f4fae8-d170-4bac-ac1e-b648ce420218 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6d27243e-c230-41c3-9739-bcc5a8d472e9 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea7ef134-7129-475b-bf19-bafde5569cea Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea7ef134-7129-475b-bf19-bafde5569cea Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9bee8b4b-9c8f-44a5-9427-1c99f19be665 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost certmonger[38302]: 2026-01-23 08:03:25 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9bee8b4b-9c8f-44a5-9427-1c99f19be665 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8d132357-231f-452a-9d08-07a34990fc19 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5aa1d121-f66f-4d6d-bc9f-c5f613ea2e0c Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d3f56559-58b1-4592-9469-a240f02d2144 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f4bd9b9b-6a67-47f3-be5f-0f19b39389db Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2ee3b454-a622-40d7-9e9f-f5eb57211f01 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l de426be0-8392-4cb6-9dbe-dd5eb1a05061 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eecaecfd-cf40-49df-a330-7fed3cc8f2fa Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eecaecfd-cf40-49df-a330-7fed3cc8f2fa Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 54c230be-3953-4b05-bc07-0d1057a2aa7c Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d3f56559-58b1-4592-9469-a240f02d2144 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b33beb8f-9136-45a0-84b3-66abd2d3a414 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 168e9ac3-cf42-4c71-b900-8fb3224b7e94 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 168e9ac3-cf42-4c71-b900-8fb3224b7e94 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa8cc330-b424-4513-bcdd-05493320c535 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa8cc330-b424-4513-bcdd-05493320c535 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:25 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_REQ_SUBJECT" to "CN=np0005593101.external.ooo.test" for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_REQ_HOSTNAME" to "np0005593101.external.ooo.test Jan 23 03:03:26 localhost certmonger[39046]: " for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_REQ_PRINCIPAL" to "HTTP/np0005593101.external.ooo.test@OOO.TEST Jan 23 03:03:26 localhost certmonger[39046]: " for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_OPERATION" to "SUBMIT" for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_CSR" to "-----BEGIN CERTIFICATE REQUEST----- Jan 23 03:03:26 localhost certmonger[39046]: MIIDxjCCAq4CAQAwKTEnMCUGA1UEAxMebnAwMDA1NTkzMTAxLmV4dGVybmFsLm9v Jan 23 03:03:26 localhost certmonger[39046]: by50ZXN0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApCTwWMcsnroI Jan 23 03:03:26 localhost certmonger[39046]: gF1mbMnSHG5mKc1+X2Bqp6p7mtGxV/orJKBN6ZfVAkK4/atWesTi0T5MoHNNlBe6 Jan 23 03:03:26 localhost certmonger[39046]: BUxXFGeNVqP5r84J5P/Wy+PmJKUrPfR9DgSusYHHmMb4zYKES2BVmt50qrIDEVIV Jan 23 03:03:26 localhost certmonger[39046]: S3fHedBCIzj5L3mE7Zs/uaZENaIX5gHG0awsovHlJuBgEnT8SGhQCQeUTVMIgv/h Jan 23 03:03:26 localhost certmonger[39046]: K6+ZvxwVVrik260jq1Um8kn0SmrqeWk2GxxZN4pfMFw/OiLESlVxHIviGRrmPUye Jan 23 03:03:26 localhost certmonger[39046]: eZKFmt1ts+fgKip45AA8suJtFDi8O8LijuRTkJLRFAawmjSD58ntxiDMW98UdN+u Jan 23 03:03:26 localhost certmonger[39046]: vSo7RXQ1wwIDAQABoIIBVjArBgkqhkiG9w0BCRQxHh4cADIAMAAyADYAMAAxADIA Jan 23 03:03:26 localhost certmonger[39046]: MwAwADgAMAAzADIANTCCASUGCSqGSIb3DQEJDjGCARYwggESMAsGA1UdDwQEAwIF Jan 23 03:03:26 localhost certmonger[39046]: oDCBtgYDVR0RBIGuMIGrgh5ucDAwMDU1OTMxMDEuZXh0ZXJuYWwub29vLnRlc3Sg Jan 23 03:03:26 localhost certmonger[39046]: PAYKKwYBBAGCNxQCA6AuDCxIVFRQL25wMDAwNTU5MzEwMS5leHRlcm5hbC5vb28u Jan 23 03:03:26 localhost certmonger[39046]: dGVzdEBPT08uVEVTVKBLBgYrBgEFAgKgQTA/oAobCE9PTy5URVNUoTEwL6ADAgEB Jan 23 03:03:26 localhost certmonger[39046]: oSgwJhsESFRUUBsebnAwMDA1NTkzMTAxLmV4dGVybmFsLm9vby50ZXN0MB0GA1Ud Jan 23 03:03:26 localhost certmonger[39046]: JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW Jan 23 03:03:26 localhost certmonger[39046]: BBRwxyTqFUDgAZdgOkdqRItrr4RxkDANBgkqhkiG9w0BAQsFAAOCAQEAbur4j4V1 Jan 23 03:03:26 localhost certmonger[39046]: TvuGcTS0jGmgwrmro2/w9E7pURBaBzxq5tfystU43uktuncdfHpPFSl5CLCMOM9j Jan 23 03:03:26 localhost certmonger[39046]: PmHi2P5fUpPfmbc7sWBQGH2nug+eqA39zFeVVDlmh999vvxnltCaSQDG8CyzSXtH Jan 23 03:03:26 localhost certmonger[39046]: h9gCMqxxbK9yr9Nbc1r8SknuKDyO6WsrZXc/6RY7D6eloA1qponttP3PNPTOwHZW Jan 23 03:03:26 localhost certmonger[39046]: 2GSgJzrN7olD/llxNE4dJBvq9HJerhZuK3gw9ejcGfAZWGho1LLsNAR1J0QTiPQO Jan 23 03:03:26 localhost certmonger[39046]: 5pfAjs5f6v/S5CnrRIyfhVwwrqS4ySZiljabu56WUOabDKj9cB5UinkM84t3S9bq Jan 23 03:03:26 localhost certmonger[39046]: KWzmlyxLp3v/OA== Jan 23 03:03:26 localhost certmonger[39046]: -----END CERTIFICATE REQUEST----- Jan 23 03:03:26 localhost certmonger[39046]: " for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_SPKAC" to "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" for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_SPKI" to "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApCTwWMcsnroIgF1mbMnSHG5mKc1+X2Bqp6p7mtGxV/orJKBN6ZfVAkK4/atWesTi0T5MoHNNlBe6BUxXFGeNVqP5r84J5P/Wy+PmJKUrPfR9DgSusYHHmMb4zYKES2BVmt50qrIDEVIVS3fHedBCIzj5L3mE7Zs/uaZENaIX5gHG0awsovHlJuBgEnT8SGhQCQeUTVMIgv/hK6+ZvxwVVrik260jq1Um8kn0SmrqeWk2GxxZN4pfMFw/OiLESlVxHIviGRrmPUyeeZKFmt1ts+fgKip45AA8suJtFDi8O8LijuRTkJLRFAawmjSD58ntxiDMW98UdN+uvSo7RXQ1wwIDAQAB" for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_LOCAL_CA_DIR" to "/var/lib/certmonger/local" for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_KEY_TYPE" to "RSA" for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Setting "CERTMONGER_CA_NICKNAME" to "IPA" for child. Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Redirecting stdin to /dev/null, leaving stdout and stderr open for child "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:26 localhost certmonger[39046]: 2026-01-23 08:03:26 [39046] Running enrollment helper "/usr/libexec/certmonger/ipa-submit". Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost certmonger[39046]: Submitting request to "https://ipa.ooo.test/ipa/json". Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9ecdd13-c1a5-48f6-afbb-038ee8e1459f Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9a94edf9-81c9-4876-9776-4146762e2e6e Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09b0889b-a362-4d48-8664-11a8a4ffa339 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5aa1d121-f66f-4d6d-bc9f-c5f613ea2e0c Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5f4fae8-d170-4bac-ac1e-b648ce420218 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6d27243e-c230-41c3-9739-bcc5a8d472e9 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea7ef134-7129-475b-bf19-bafde5569cea Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea7ef134-7129-475b-bf19-bafde5569cea Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9bee8b4b-9c8f-44a5-9427-1c99f19be665 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9bee8b4b-9c8f-44a5-9427-1c99f19be665 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8d132357-231f-452a-9d08-07a34990fc19 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5aa1d121-f66f-4d6d-bc9f-c5f613ea2e0c Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d3f56559-58b1-4592-9469-a240f02d2144 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f4bd9b9b-6a67-47f3-be5f-0f19b39389db Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2ee3b454-a622-40d7-9e9f-f5eb57211f01 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[39046]: Certificate: "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" Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Certificate submission still ongoing. Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l de426be0-8392-4cb6-9dbe-dd5eb1a05061 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Certificate submission attempt complete. Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Child status = 0. Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Child output: Jan 23 03:03:26 localhost certmonger[38302]: "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38302]: MIIFWDCCA8CgAwIBAgIQFeDyaZsxzRy0ok/wxbJugjANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:26 localhost certmonger[38302]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:26 localhost certmonger[38302]: aXR5MB4XDTI2MDEyMzA4MDMyNloXDTI4MDEyNDA4MDMyNlowPDERMA8GA1UECgwI Jan 23 03:03:26 localhost certmonger[38302]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMS5leHRlcm5hbC5vb28udGVz Jan 23 03:03:26 localhost certmonger[38302]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKQk8FjHLJ66CIBdZmzJ Jan 23 03:03:26 localhost certmonger[38302]: 0hxuZinNfl9gaqeqe5rRsVf6KySgTemX1QJCuP2rVnrE4tE+TKBzTZQXugVMVxRn Jan 23 03:03:26 localhost certmonger[38302]: jVaj+a/OCeT/1svj5iSlKz30fQ4ErrGBx5jG+M2ChEtgVZredKqyAxFSFUt3x3nQ Jan 23 03:03:26 localhost certmonger[38302]: QiM4+S95hO2bP7mmRDWiF+YBxtGsLKLx5SbgYBJ0/EhoUAkHlE1TCIL/4Suvmb8c Jan 23 03:03:26 localhost certmonger[38302]: FVa4pNutI6tVJvJJ9Epq6nlpNhscWTeKXzBcPzoixEpVcRyL4hka5j1MnnmShZrd Jan 23 03:03:26 localhost certmonger[38302]: bbPn4CoqeOQAPLLibRQ4vDvC4o7kU5CS0RQGsJo0g+fJ7cYgzFvfFHTfrr0qO0V0 Jan 23 03:03:26 localhost certmonger[38302]: NcMCAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:26 localhost certmonger[38302]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:26 localhost certmonger[38302]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:26 localhost certmonger[38302]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:26 localhost certmonger[38302]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:26 localhost certmonger[38302]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFD4AhAuB Jan 23 03:03:26 localhost certmonger[38302]: aT4GYsvRQteFnj868RbZMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMS5leHRl Jan 23 03:03:26 localhost certmonger[38302]: cm5hbC5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAx Jan 23 03:03:26 localhost certmonger[38302]: LmV4dGVybmFsLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:26 localhost certmonger[38302]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDEuZXh0ZXJuYWwu Jan 23 03:03:26 localhost certmonger[38302]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHLf+e68vxTRdQuA8lMO8w4Pdm0J Jan 23 03:03:26 localhost certmonger[38302]: PHP0R/yvgvRnDrrYN4AgZTnTVwRp6qHK21vRgH16t8u3Mp4imMS9Om6zQwDwiRWu Jan 23 03:03:26 localhost certmonger[38302]: G4/mwj49LR98GRH+jWxD+8AUFRManeO6seIfNkFLrEOFOq0G6LvGJVdK4ywh/ZdR Jan 23 03:03:26 localhost certmonger[38302]: F4hD5Q5BRkOeCc8WejHowtANRwRcgzfEAUBZ7me6dT9oDM7L9cPCxa93bISKlnEy Jan 23 03:03:26 localhost certmonger[38302]: DV15vFhvSreQmKmUgQx+xEiuOGrKJ92iKYAto0E1SdEI6KoP4Q1NijRAE+GwJuss Jan 23 03:03:26 localhost certmonger[38302]: mHuQN463SGxa7+kdMlG0hVFQunw7fI+OuC1pU1Bb/kRIYN+w+Y4pveArzUfAkPDs Jan 23 03:03:26 localhost certmonger[38302]: C4LgwKIvaKl9tjIsNHjmEBazwwtoox74LxsiTlYBNdPyFzkwJYPogrf7YgR+wp5n Jan 23 03:03:26 localhost certmonger[38302]: D059ZQCUA1JQ2yrEMlXMobn5ABCfAzg/xTAGt4lcn6MY184jtpcNr4xjEYRZ+YWa Jan 23 03:03:26 localhost certmonger[38302]: XQSlUPMs4JOE4jTRWi1W9UQ7QoAsjAB41TX3WQ== Jan 23 03:03:26 localhost certmonger[38302]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38302]: " Jan 23 03:03:26 localhost certmonger[39048]: 2026-01-23 08:03:26 [39048] Postprocessing output "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[39048]: MIIFWDCCA8CgAwIBAgIQFeDyaZsxzRy0ok/wxbJugjANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:26 localhost certmonger[39048]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:26 localhost certmonger[39048]: aXR5MB4XDTI2MDEyMzA4MDMyNloXDTI4MDEyNDA4MDMyNlowPDERMA8GA1UECgwI Jan 23 03:03:26 localhost certmonger[39048]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMS5leHRlcm5hbC5vb28udGVz Jan 23 03:03:26 localhost certmonger[39048]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKQk8FjHLJ66CIBdZmzJ Jan 23 03:03:26 localhost certmonger[39048]: 0hxuZinNfl9gaqeqe5rRsVf6KySgTemX1QJCuP2rVnrE4tE+TKBzTZQXugVMVxRn Jan 23 03:03:26 localhost certmonger[39048]: jVaj+a/OCeT/1svj5iSlKz30fQ4ErrGBx5jG+M2ChEtgVZredKqyAxFSFUt3x3nQ Jan 23 03:03:26 localhost certmonger[39048]: QiM4+S95hO2bP7mmRDWiF+YBxtGsLKLx5SbgYBJ0/EhoUAkHlE1TCIL/4Suvmb8c Jan 23 03:03:26 localhost certmonger[39048]: FVa4pNutI6tVJvJJ9Epq6nlpNhscWTeKXzBcPzoixEpVcRyL4hka5j1MnnmShZrd Jan 23 03:03:26 localhost certmonger[39048]: bbPn4CoqeOQAPLLibRQ4vDvC4o7kU5CS0RQGsJo0g+fJ7cYgzFvfFHTfrr0qO0V0 Jan 23 03:03:26 localhost certmonger[39048]: NcMCAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:26 localhost certmonger[39048]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:26 localhost certmonger[39048]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:26 localhost certmonger[39048]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:26 localhost certmonger[39048]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:26 localhost certmonger[39048]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFD4AhAuB Jan 23 03:03:26 localhost certmonger[39048]: aT4GYsvRQteFnj868RbZMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMS5leHRl Jan 23 03:03:26 localhost certmonger[39048]: cm5hbC5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAx Jan 23 03:03:26 localhost certmonger[39048]: LmV4dGVybmFsLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:26 localhost certmonger[39048]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDEuZXh0ZXJuYWwu Jan 23 03:03:26 localhost certmonger[39048]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHLf+e68vxTRdQuA8lMO8w4Pdm0J Jan 23 03:03:26 localhost certmonger[39048]: PHP0R/yvgvRnDrrYN4AgZTnTVwRp6qHK21vRgH16t8u3Mp4imMS9Om6zQwDwiRWu Jan 23 03:03:26 localhost certmonger[39048]: G4/mwj49LR98GRH+jWxD+8AUFRManeO6seIfNkFLrEOFOq0G6LvGJVdK4ywh/ZdR Jan 23 03:03:26 localhost certmonger[39048]: F4hD5Q5BRkOeCc8WejHowtANRwRcgzfEAUBZ7me6dT9oDM7L9cPCxa93bISKlnEy Jan 23 03:03:26 localhost certmonger[39048]: DV15vFhvSreQmKmUgQx+xEiuOGrKJ92iKYAto0E1SdEI6KoP4Q1NijRAE+GwJuss Jan 23 03:03:26 localhost certmonger[39048]: mHuQN463SGxa7+kdMlG0hVFQunw7fI+OuC1pU1Bb/kRIYN+w+Y4pveArzUfAkPDs Jan 23 03:03:26 localhost certmonger[39048]: C4LgwKIvaKl9tjIsNHjmEBazwwtoox74LxsiTlYBNdPyFzkwJYPogrf7YgR+wp5n Jan 23 03:03:26 localhost certmonger[39048]: D059ZQCUA1JQ2yrEMlXMobn5ABCfAzg/xTAGt4lcn6MY184jtpcNr4xjEYRZ+YWa Jan 23 03:03:26 localhost certmonger[39048]: XQSlUPMs4JOE4jTRWi1W9UQ7QoAsjAB41TX3WQ== Jan 23 03:03:26 localhost certmonger[39048]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[39048]: ". Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Certificate submission still ongoing. Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Certificate submission postprocessing complete. Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Child status = 0. Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Child output: Jan 23 03:03:26 localhost certmonger[38302]: "{"certificate":"-----BEGIN CERTIFICATE-----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\nXQSlUPMs4JOE4jTRWi1W9UQ7QoAsjAB41TX3WQ==\n-----END CERTIFICATE-----\n","key_checked":true} Jan 23 03:03:26 localhost certmonger[38302]: " Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Issued certificate is "-----BEGIN CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38302]: MIIFWDCCA8CgAwIBAgIQFeDyaZsxzRy0ok/wxbJugjANBgkqhkiG9w0BAQsFADAz Jan 23 03:03:26 localhost certmonger[38302]: MREwDwYDVQQKDAhPT08uVEVTVDEeMBwGA1UEAwwVQ2VydGlmaWNhdGUgQXV0aG9y Jan 23 03:03:26 localhost certmonger[38302]: aXR5MB4XDTI2MDEyMzA4MDMyNloXDTI4MDEyNDA4MDMyNlowPDERMA8GA1UECgwI Jan 23 03:03:26 localhost certmonger[38302]: T09PLlRFU1QxJzAlBgNVBAMMHm5wMDAwNTU5MzEwMS5leHRlcm5hbC5vb28udGVz Jan 23 03:03:26 localhost certmonger[38302]: dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKQk8FjHLJ66CIBdZmzJ Jan 23 03:03:26 localhost certmonger[38302]: 0hxuZinNfl9gaqeqe5rRsVf6KySgTemX1QJCuP2rVnrE4tE+TKBzTZQXugVMVxRn Jan 23 03:03:26 localhost certmonger[38302]: jVaj+a/OCeT/1svj5iSlKz30fQ4ErrGBx5jG+M2ChEtgVZredKqyAxFSFUt3x3nQ Jan 23 03:03:26 localhost certmonger[38302]: QiM4+S95hO2bP7mmRDWiF+YBxtGsLKLx5SbgYBJ0/EhoUAkHlE1TCIL/4Suvmb8c Jan 23 03:03:26 localhost certmonger[38302]: FVa4pNutI6tVJvJJ9Epq6nlpNhscWTeKXzBcPzoixEpVcRyL4hka5j1MnnmShZrd Jan 23 03:03:26 localhost certmonger[38302]: bbPn4CoqeOQAPLLibRQ4vDvC4o7kU5CS0RQGsJo0g+fJ7cYgzFvfFHTfrr0qO0V0 Jan 23 03:03:26 localhost certmonger[38302]: NcMCAwEAAaOCAd0wggHZMB8GA1UdIwQYMBaAFPa530/5VH1zPZShktPrWq13LPI4 Jan 23 03:03:26 localhost certmonger[38302]: MDoGCCsGAQUFBwEBBC4wLDAqBggrBgEFBQcwAYYeaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:26 localhost certmonger[38302]: dGVzdC9jYS9vY3NwMA4GA1UdDwEB/wQEAwIE8DAdBgNVHSUEFjAUBggrBgEFBQcD Jan 23 03:03:26 localhost certmonger[38302]: AQYIKwYBBQUHAwIwcwYDVR0fBGwwajBooDCgLoYsaHR0cDovL2lwYS1jYS5vb28u Jan 23 03:03:26 localhost certmonger[38302]: dGVzdC9pcGEvY3JsL01hc3RlckNSTC5iaW6iNKQyMDAxDjAMBgNVBAoMBWlwYWNh Jan 23 03:03:26 localhost certmonger[38302]: MR4wHAYDVQQDDBVDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwHQYDVR0OBBYEFD4AhAuB Jan 23 03:03:26 localhost certmonger[38302]: aT4GYsvRQteFnj868RbZMIG2BgNVHREEga4wgauCHm5wMDAwNTU5MzEwMS5leHRl Jan 23 03:03:26 localhost certmonger[38302]: cm5hbC5vb28udGVzdKA8BgorBgEEAYI3FAIDoC4MLEhUVFAvbnAwMDA1NTkzMTAx Jan 23 03:03:26 localhost certmonger[38302]: LmV4dGVybmFsLm9vby50ZXN0QE9PTy5URVNUoEsGBisGAQUCAqBBMD+gChsIT09P Jan 23 03:03:26 localhost certmonger[38302]: LlRFU1ShMTAvoAMCAQGhKDAmGwRIVFRQGx5ucDAwMDU1OTMxMDEuZXh0ZXJuYWwu Jan 23 03:03:26 localhost certmonger[38302]: b29vLnRlc3QwDQYJKoZIhvcNAQELBQADggGBAHLf+e68vxTRdQuA8lMO8w4Pdm0J Jan 23 03:03:26 localhost certmonger[38302]: PHP0R/yvgvRnDrrYN4AgZTnTVwRp6qHK21vRgH16t8u3Mp4imMS9Om6zQwDwiRWu Jan 23 03:03:26 localhost certmonger[38302]: G4/mwj49LR98GRH+jWxD+8AUFRManeO6seIfNkFLrEOFOq0G6LvGJVdK4ywh/ZdR Jan 23 03:03:26 localhost certmonger[38302]: F4hD5Q5BRkOeCc8WejHowtANRwRcgzfEAUBZ7me6dT9oDM7L9cPCxa93bISKlnEy Jan 23 03:03:26 localhost certmonger[38302]: DV15vFhvSreQmKmUgQx+xEiuOGrKJ92iKYAto0E1SdEI6KoP4Q1NijRAE+GwJuss Jan 23 03:03:26 localhost certmonger[38302]: mHuQN463SGxa7+kdMlG0hVFQunw7fI+OuC1pU1Bb/kRIYN+w+Y4pveArzUfAkPDs Jan 23 03:03:26 localhost certmonger[38302]: C4LgwKIvaKl9tjIsNHjmEBazwwtoox74LxsiTlYBNdPyFzkwJYPogrf7YgR+wp5n Jan 23 03:03:26 localhost certmonger[38302]: D059ZQCUA1JQ2yrEMlXMobn5ABCfAzg/xTAGt4lcn6MY184jtpcNr4xjEYRZ+YWa Jan 23 03:03:26 localhost certmonger[38302]: XQSlUPMs4JOE4jTRWi1W9UQ7QoAsjAB41TX3WQ== Jan 23 03:03:26 localhost certmonger[38302]: -----END CERTIFICATE----- Jan 23 03:03:26 localhost certmonger[38302]: ". Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Certificate issued (0 chain certificates, 0 roots). Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] No hooks set for pre-save command. Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eecaecfd-cf40-49df-a330-7fed3cc8f2fa Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eecaecfd-cf40-49df-a330-7fed3cc8f2fa Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 54c230be-3953-4b05-bc07-0d1057a2aa7c Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d3f56559-58b1-4592-9469-a240f02d2144 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost certmonger[39056]: Certificate in file "/etc/pki/tls/certs/httpd-external.crt" issued by CA and saved. Jan 23 03:03:26 localhost certmonger[38302]: 2026-01-23 08:03:26 [38302] Wrote to /var/lib/certmonger/requests/20260123080325 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b33beb8f-9136-45a0-84b3-66abd2d3a414 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 168e9ac3-cf42-4c71-b900-8fb3224b7e94 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 168e9ac3-cf42-4c71-b900-8fb3224b7e94 Jan 23 03:03:26 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa8cc330-b424-4513-bcdd-05493320c535 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa8cc330-b424-4513-bcdd-05493320c535 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:27 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost sedispatch[727]: AVC Message regarding setroubleshoot, ignoring message Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9ecdd13-c1a5-48f6-afbb-038ee8e1459f Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9a94edf9-81c9-4876-9776-4146762e2e6e Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09b0889b-a362-4d48-8664-11a8a4ffa339 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l da73bf27-6227-48fd-8c94-404e09a08816 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:28 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5aa1d121-f66f-4d6d-bc9f-c5f613ea2e0c Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5f4fae8-d170-4bac-ac1e-b648ce420218 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6d27243e-c230-41c3-9739-bcc5a8d472e9 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea7ef134-7129-475b-bf19-bafde5569cea Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea7ef134-7129-475b-bf19-bafde5569cea Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9bee8b4b-9c8f-44a5-9427-1c99f19be665 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9bee8b4b-9c8f-44a5-9427-1c99f19be665 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8d132357-231f-452a-9d08-07a34990fc19 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5aa1d121-f66f-4d6d-bc9f-c5f613ea2e0c Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d3f56559-58b1-4592-9469-a240f02d2144 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f4bd9b9b-6a67-47f3-be5f-0f19b39389db Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2ee3b454-a622-40d7-9e9f-f5eb57211f01 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l de426be0-8392-4cb6-9dbe-dd5eb1a05061 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eecaecfd-cf40-49df-a330-7fed3cc8f2fa Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eecaecfd-cf40-49df-a330-7fed3cc8f2fa Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 54c230be-3953-4b05-bc07-0d1057a2aa7c Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d3f56559-58b1-4592-9469-a240f02d2144 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b33beb8f-9136-45a0-84b3-66abd2d3a414 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 168e9ac3-cf42-4c71-b900-8fb3224b7e94 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 168e9ac3-cf42-4c71-b900-8fb3224b7e94 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa8cc330-b424-4513-bcdd-05493320c535 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa8cc330-b424-4513-bcdd-05493320c535 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9ecdd13-c1a5-48f6-afbb-038ee8e1459f Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9a94edf9-81c9-4876-9776-4146762e2e6e Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09b0889b-a362-4d48-8664-11a8a4ffa339 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l da73bf27-6227-48fd-8c94-404e09a08816 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:29 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5aa1d121-f66f-4d6d-bc9f-c5f613ea2e0c Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l a5f4fae8-d170-4bac-ac1e-b648ce420218 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6d27243e-c230-41c3-9739-bcc5a8d472e9 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea7ef134-7129-475b-bf19-bafde5569cea Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l ea7ef134-7129-475b-bf19-bafde5569cea Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9bee8b4b-9c8f-44a5-9427-1c99f19be665 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9bee8b4b-9c8f-44a5-9427-1c99f19be665 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 8d132357-231f-452a-9d08-07a34990fc19 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 5aa1d121-f66f-4d6d-bc9f-c5f613ea2e0c Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d3f56559-58b1-4592-9469-a240f02d2144 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l f4bd9b9b-6a67-47f3-be5f-0f19b39389db Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 2ee3b454-a622-40d7-9e9f-f5eb57211f01 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l de426be0-8392-4cb6-9dbe-dd5eb1a05061 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eecaecfd-cf40-49df-a330-7fed3cc8f2fa Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l eecaecfd-cf40-49df-a330-7fed3cc8f2fa Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 54c230be-3953-4b05-bc07-0d1057a2aa7c Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l d3f56559-58b1-4592-9469-a240f02d2144 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l b33beb8f-9136-45a0-84b3-66abd2d3a414 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 168e9ac3-cf42-4c71-b900-8fb3224b7e94 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 168e9ac3-cf42-4c71-b900-8fb3224b7e94 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa8cc330-b424-4513-bcdd-05493320c535 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l fa8cc330-b424-4513-bcdd-05493320c535 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c9ecdd13-c1a5-48f6-afbb-038ee8e1459f Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 9a94edf9-81c9-4876-9776-4146762e2e6e Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 09b0889b-a362-4d48-8664-11a8a4ffa339 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 3b634041-5b10-4e3a-82e3-ef5758c9d907 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 6715df46-3066-49df-b806-1ffc71c5e4a0 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l 307a9798-a2e2-4e54-96ea-291683062224 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l da73bf27-6227-48fd-8c94-404e09a08816 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/. For complete SELinux messages run: sealert -l c07c3c68-8970-4069-9290-2318441412d6 Jan 23 03:03:30 localhost setroubleshoot[38910]: SELinux is preventing /usr/bin/pkill from getattr access on the directory /proc/.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that pkill should be allowed getattr access on the directory by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'pkill' --raw | audit2allow -M my-pkill#012# semodule -X 300 -i my-pkill.pp#012 Jan 23 03:03:40 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Jan 23 03:03:40 localhost systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.462s CPU time. Jan 23 03:03:40 localhost systemd[1]: setroubleshootd.service: Deactivated successfully. Jan 23 03:03:40 localhost systemd[1]: setroubleshootd.service: Consumed 9.953s CPU time. Jan 23 03:05:06 localhost sshd[39058]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:05:40 localhost sshd[39060]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:18:44 localhost sshd[39068]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:18:50 localhost sshd[39071]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:18:53 localhost sshd[39074]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:18:57 localhost sshd[39077]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:01 localhost sshd[39080]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:04 localhost sshd[39083]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:08 localhost sshd[39086]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:11 localhost sshd[39089]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:17 localhost sshd[39092]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:23 localhost sshd[39095]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:28 localhost sshd[39098]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:34 localhost sshd[39101]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:40 localhost sshd[39104]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:46 localhost sshd[39107]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:49 localhost sshd[39110]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:53 localhost sshd[39113]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:19:58 localhost sshd[39116]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:02 localhost sshd[39119]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:05 localhost sshd[39122]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:11 localhost sshd[39125]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:14 localhost sshd[39128]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:18 localhost sshd[39131]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:21 localhost sshd[39134]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:25 localhost sshd[39137]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:28 localhost sshd[39140]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:34 localhost sshd[39143]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:37 localhost sshd[39146]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:41 localhost sshd[39149]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:44 localhost sshd[39152]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:47 localhost sshd[39155]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:51 localhost sshd[39158]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:54 localhost sshd[39161]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:20:57 localhost sshd[39164]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:01 localhost sshd[39167]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:07 localhost sshd[39170]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:10 localhost sshd[39173]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:14 localhost sshd[39176]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:17 localhost sshd[39179]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:23 localhost sshd[39182]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:26 localhost sshd[39185]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:30 localhost sshd[39188]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:33 localhost sshd[39191]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:37 localhost sshd[39194]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:40 localhost sshd[39197]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:43 localhost sshd[39200]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:47 localhost sshd[39203]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:50 localhost sshd[39206]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:53 localhost sshd[39209]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:21:57 localhost sshd[39213]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:00 localhost sshd[39216]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:04 localhost sshd[39219]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:07 localhost sshd[39222]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:10 localhost sshd[39225]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:14 localhost sshd[39228]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:17 localhost sshd[39231]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:21 localhost sshd[39234]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:25 localhost sshd[39237]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:28 localhost sshd[39240]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:31 localhost sshd[39243]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:35 localhost sshd[39246]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:40 localhost sshd[39249]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:43 localhost sshd[39252]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:44 localhost sshd[39254]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:47 localhost sshd[39258]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:53 localhost sshd[39262]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:22:56 localhost sshd[39265]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:00 localhost sshd[39268]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:03 localhost sshd[39271]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:06 localhost sshd[39274]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:10 localhost sshd[39277]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:13 localhost sshd[39280]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:17 localhost sshd[39283]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:20 localhost sshd[39286]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:23 localhost sshd[39289]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:27 localhost sshd[39292]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:30 localhost sshd[39295]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:34 localhost sshd[39298]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:37 localhost sshd[39301]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:40 localhost sshd[39304]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:44 localhost sshd[39307]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:47 localhost sshd[39310]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:51 localhost sshd[39313]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:54 localhost sshd[39316]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:23:58 localhost sshd[39319]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:02 localhost sshd[39322]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:06 localhost sshd[39324]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:10 localhost sshd[39326]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:15 localhost sshd[39328]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:19 localhost sshd[39330]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:23 localhost sshd[39332]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:28 localhost sshd[39334]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:32 localhost sshd[39336]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:36 localhost sshd[39338]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:40 localhost sshd[39340]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:45 localhost sshd[39342]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:49 localhost sshd[39344]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:53 localhost sshd[39346]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:24:58 localhost sshd[39348]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:02 localhost sshd[39350]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:06 localhost sshd[39352]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:10 localhost sshd[39354]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:15 localhost sshd[39356]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:19 localhost sshd[39358]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:23 localhost sshd[39360]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:28 localhost sshd[39362]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:32 localhost sshd[39364]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:36 localhost sshd[39366]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:41 localhost sshd[39368]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:45 localhost sshd[39370]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:49 localhost sshd[39372]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:53 localhost sshd[39374]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:25:58 localhost sshd[39376]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:01 localhost systemd[1]: session-14.scope: Deactivated successfully. Jan 23 03:26:01 localhost systemd[1]: session-14.scope: Consumed 2.989s CPU time. Jan 23 03:26:01 localhost systemd-logind[35752]: Session 14 logged out. Waiting for processes to exit. Jan 23 03:26:01 localhost systemd-logind[35752]: Removed session 14. Jan 23 03:26:02 localhost sshd[39378]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:06 localhost sshd[39380]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:11 localhost sshd[39382]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:12 localhost systemd[1]: Stopping User Manager for UID 1000... Jan 23 03:26:12 localhost systemd[4175]: Activating special unit Exit the Session... Jan 23 03:26:12 localhost systemd[4175]: Stopping podman-pause-61dbcc92.scope... Jan 23 03:26:12 localhost systemd[4175]: Removed slice User Background Tasks Slice. Jan 23 03:26:12 localhost systemd[4175]: Stopped target Main User Target. Jan 23 03:26:12 localhost systemd[4175]: Stopped target Basic System. Jan 23 03:26:12 localhost systemd[4175]: Stopped target Paths. Jan 23 03:26:12 localhost systemd[4175]: Stopped target Sockets. Jan 23 03:26:12 localhost systemd[4175]: Stopped target Timers. Jan 23 03:26:12 localhost systemd[4175]: Stopped Mark boot as successful after the user session has run 2 minutes. Jan 23 03:26:12 localhost systemd[4175]: Stopped Daily Cleanup of User's Temporary Directories. Jan 23 03:26:12 localhost dbus-broker[18429]: Dispatched 249 messages @ 10(±56)μs / message. Jan 23 03:26:12 localhost systemd[4175]: Stopping D-Bus User Message Bus... Jan 23 03:26:12 localhost systemd[4175]: Stopped Create User's Volatile Files and Directories. Jan 23 03:26:12 localhost systemd[4175]: Stopped podman-pause-61dbcc92.scope. Jan 23 03:26:12 localhost systemd[4175]: Removed slice Slice /user. Jan 23 03:26:12 localhost systemd[4175]: Stopped D-Bus User Message Bus. Jan 23 03:26:12 localhost systemd[4175]: Closed D-Bus User Message Bus Socket. Jan 23 03:26:12 localhost systemd[4175]: Removed slice User Application Slice. Jan 23 03:26:12 localhost systemd[4175]: Reached target Shutdown. Jan 23 03:26:12 localhost systemd[4175]: Finished Exit the Session. Jan 23 03:26:12 localhost systemd[4175]: Reached target Exit the Session. Jan 23 03:26:12 localhost systemd[1]: user@1000.service: Deactivated successfully. Jan 23 03:26:12 localhost systemd[1]: Stopped User Manager for UID 1000. Jan 23 03:26:15 localhost sshd[39386]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:18 localhost sshd[39388]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:22 localhost sshd[39390]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:26 localhost sshd[39392]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:31 localhost sshd[39394]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:35 localhost sshd[39396]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:39 localhost sshd[39398]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:42 localhost sshd[39400]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:46 localhost sshd[39402]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:50 localhost sshd[39404]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:53 localhost sshd[39406]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:26:57 localhost sshd[39408]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:02 localhost sshd[39410]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:04 localhost sshd[39412]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:09 localhost sshd[39414]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:13 localhost sshd[39416]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:16 localhost sshd[39418]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:20 localhost sshd[39420]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:25 localhost sshd[39422]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:29 localhost sshd[39424]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:33 localhost sshd[39426]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:36 localhost sshd[39428]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:40 localhost sshd[39430]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:44 localhost sshd[39432]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:49 localhost sshd[39434]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:53 localhost sshd[39437]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:27:58 localhost sshd[39439]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:02 localhost sshd[39441]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:06 localhost sshd[39443]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:10 localhost sshd[39445]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:15 localhost sshd[39447]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:19 localhost sshd[39449]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:24 localhost sshd[39451]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:28 localhost sshd[39453]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:32 localhost sshd[39455]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:37 localhost sshd[39457]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:41 localhost sshd[39459]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:45 localhost sshd[39461]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:48 localhost sshd[39463]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:52 localhost sshd[39465]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:28:56 localhost sshd[39467]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:01 localhost sshd[39469]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:05 localhost sshd[39471]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:09 localhost sshd[39473]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:12 localhost sshd[39475]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:16 localhost sshd[39477]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:21 localhost sshd[39479]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:25 localhost sshd[39481]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:29 localhost sshd[39483]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:34 localhost sshd[39486]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:36 localhost sshd[39488]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:41 localhost sshd[39490]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:46 localhost sshd[39492]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:52 localhost sshd[39494]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:55 localhost sshd[39496]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:29:58 localhost sshd[39498]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:01 localhost sshd[39500]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:04 localhost sshd[39502]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:07 localhost sshd[39504]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:12 localhost sshd[39506]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:17 localhost sshd[39508]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:20 localhost sshd[39510]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:23 localhost sshd[39512]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:28 localhost sshd[39514]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:31 localhost sshd[39516]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:36 localhost sshd[39518]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:42 localhost sshd[39520]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:47 localhost sshd[39522]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:50 localhost sshd[39524]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:54 localhost sshd[39526]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:30:59 localhost sshd[39528]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:04 localhost sshd[39530]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:08 localhost sshd[39532]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:13 localhost sshd[39534]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:18 localhost sshd[39536]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:23 localhost sshd[39538]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:27 localhost sshd[39540]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:30 localhost sshd[39542]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:35 localhost sshd[39544]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:38 localhost sshd[39546]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:41 localhost sshd[39548]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:46 localhost sshd[39550]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:51 localhost sshd[39552]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:31:56 localhost sshd[39554]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:01 localhost sshd[39556]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:04 localhost sshd[39558]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:09 localhost sshd[39560]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:14 localhost sshd[39562]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:19 localhost sshd[39564]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:23 localhost sshd[39566]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:28 localhost sshd[39569]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:31 localhost sshd[39571]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:36 localhost sshd[39573]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:41 localhost sshd[39575]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:46 localhost sshd[39578]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:51 localhost sshd[39580]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:54 localhost sshd[39582]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:32:58 localhost sshd[39584]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:03 localhost sshd[39586]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:06 localhost sshd[39588]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:11 localhost sshd[39590]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:17 localhost sshd[39592]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:20 localhost sshd[39594]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:23 localhost sshd[39596]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:27 localhost systemd[1]: session-15.scope: Deactivated successfully. Jan 23 03:33:27 localhost systemd[1]: session-15.scope: Consumed 3min 27.464s CPU time. Jan 23 03:33:27 localhost systemd-logind[35752]: Session 15 logged out. Waiting for processes to exit. Jan 23 03:33:27 localhost systemd-logind[35752]: Removed session 15. Jan 23 03:33:28 localhost sshd[39598]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:31 localhost sshd[39600]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:34 localhost sshd[39602]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:37 localhost systemd[1]: Stopping User Manager for UID 1002... Jan 23 03:33:37 localhost systemd[26159]: Activating special unit Exit the Session... Jan 23 03:33:37 localhost systemd[26159]: Removed slice User Background Tasks Slice. Jan 23 03:33:37 localhost systemd[26159]: Stopped target Main User Target. Jan 23 03:33:37 localhost systemd[26159]: Stopped target Basic System. Jan 23 03:33:37 localhost systemd[26159]: Stopped target Paths. Jan 23 03:33:37 localhost systemd[26159]: Stopped target Sockets. Jan 23 03:33:37 localhost systemd[26159]: Stopped target Timers. Jan 23 03:33:37 localhost systemd[26159]: Stopped Mark boot as successful after the user session has run 2 minutes. Jan 23 03:33:37 localhost systemd[26159]: Stopped Daily Cleanup of User's Temporary Directories. Jan 23 03:33:37 localhost systemd[26159]: Closed D-Bus User Message Bus Socket. Jan 23 03:33:37 localhost systemd[26159]: Stopped Create User's Volatile Files and Directories. Jan 23 03:33:37 localhost systemd[26159]: Removed slice User Application Slice. Jan 23 03:33:37 localhost systemd[26159]: Reached target Shutdown. Jan 23 03:33:37 localhost systemd[26159]: Finished Exit the Session. Jan 23 03:33:37 localhost systemd[26159]: Reached target Exit the Session. Jan 23 03:33:37 localhost systemd[1]: user@1002.service: Deactivated successfully. Jan 23 03:33:37 localhost systemd[1]: Stopped User Manager for UID 1002. Jan 23 03:33:37 localhost systemd[1]: Stopping User Runtime Directory /run/user/1002... Jan 23 03:33:37 localhost systemd[1]: run-user-1002.mount: Deactivated successfully. Jan 23 03:33:37 localhost systemd[1]: user-runtime-dir@1002.service: Deactivated successfully. Jan 23 03:33:37 localhost systemd[1]: Stopped User Runtime Directory /run/user/1002. Jan 23 03:33:37 localhost systemd[1]: Removed slice User Slice of UID 1002. Jan 23 03:33:37 localhost systemd[1]: user-1002.slice: Consumed 3min 27.713s CPU time. Jan 23 03:33:39 localhost sshd[39609]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:42 localhost sshd[39611]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:47 localhost sshd[39613]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:52 localhost sshd[39615]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:33:55 localhost sshd[39617]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:00 localhost sshd[39619]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:06 localhost sshd[39621]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:11 localhost sshd[39623]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:14 localhost sshd[39625]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:17 localhost sshd[39627]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:22 localhost sshd[39629]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:27 localhost sshd[39631]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:30 localhost sshd[39633]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:35 localhost sshd[39635]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:38 localhost sshd[39637]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:42 localhost sshd[39639]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:47 localhost sshd[39641]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:50 localhost sshd[39643]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:53 localhost sshd[39645]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:56 localhost sshd[39647]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:34:59 localhost sshd[39650]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:04 localhost sshd[39652]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:10 localhost sshd[39654]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:13 localhost sshd[39656]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:16 localhost sshd[39658]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:21 localhost sshd[39660]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:24 localhost sshd[39662]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:27 localhost sshd[39664]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:30 localhost sshd[39666]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:36 localhost sshd[39668]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:41 localhost sshd[39670]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:44 localhost sshd[39672]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:47 localhost sshd[39674]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:50 localhost sshd[39676]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:53 localhost sshd[39678]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:35:59 localhost sshd[39680]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:02 localhost sshd[39682]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:07 localhost sshd[39684]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:10 localhost sshd[39686]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:13 localhost sshd[39688]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:17 localhost sshd[39690]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:20 localhost sshd[39692]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:23 localhost sshd[39694]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:26 localhost sshd[39696]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:29 localhost sshd[39698]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:35 localhost sshd[39700]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:38 localhost sshd[39702]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:41 localhost sshd[39704]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:44 localhost sshd[39706]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:47 localhost sshd[39708]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:53 localhost sshd[39710]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:56 localhost sshd[39712]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:36:59 localhost sshd[39714]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:04 localhost sshd[39716]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:07 localhost sshd[39718]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:11 localhost sshd[39720]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:16 localhost sshd[39722]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:19 localhost sshd[39724]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:25 localhost sshd[39726]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:28 localhost sshd[39728]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:31 localhost sshd[39730]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:36 localhost sshd[39732]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:39 localhost sshd[39734]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:44 localhost sshd[39736]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:50 localhost sshd[39738]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:37:55 localhost sshd[39740]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:00 localhost sshd[39743]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:05 localhost sshd[39745]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:11 localhost sshd[39747]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:14 localhost sshd[39749]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:19 localhost sshd[39751]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:24 localhost sshd[39753]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:29 localhost sshd[39755]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:34 localhost sshd[39757]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:38 localhost sshd[39759]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:43 localhost sshd[39761]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:48 localhost sshd[39763]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:53 localhost sshd[39765]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:38:56 localhost sshd[39767]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:00 localhost sshd[39769]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:05 localhost sshd[39771]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:08 localhost sshd[39773]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:11 localhost sshd[39775]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:16 localhost sshd[39777]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:21 localhost sshd[39779]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:27 localhost sshd[39781]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:30 localhost sshd[39783]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:33 localhost sshd[39785]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:38 localhost sshd[39787]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:41 localhost sshd[39789]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:45 localhost sshd[39791]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:46 localhost sshd[39793]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:46 localhost krb5_child[39797]: Preauthentication failed Jan 23 03:39:46 localhost krb5_child[39797]: Preauthentication failed Jan 23 03:39:50 localhost sshd[39798]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:53 localhost sshd[39800]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:39:56 localhost sshd[39802]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:01 localhost sshd[39804]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:06 localhost sshd[39806]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:10 localhost sshd[39808]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:13 localhost sshd[39810]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:16 localhost sshd[39812]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:19 localhost sshd[39814]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:24 localhost sshd[39817]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:29 localhost sshd[39819]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:35 localhost sshd[39821]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:40 localhost sshd[39823]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:43 localhost sshd[39825]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:48 localhost sshd[39827]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:51 localhost systemd[1]: Starting dnf makecache... Jan 23 03:40:51 localhost sshd[39830]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:52 localhost dnf[39829]: Updating Subscription Management repositories. Jan 23 03:40:53 localhost dnf[39829]: Metadata cache refreshed recently. Jan 23 03:40:53 localhost systemd[1]: dnf-makecache.service: Deactivated successfully. Jan 23 03:40:53 localhost systemd[1]: Finished dnf makecache. Jan 23 03:40:53 localhost systemd[1]: dnf-makecache.service: Consumed 2.078s CPU time. Jan 23 03:40:55 localhost sshd[39834]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:40:56 localhost krb5_child[39837]: Preauthentication failed Jan 23 03:40:56 localhost krb5_child[39837]: Preauthentication failed Jan 23 03:41:00 localhost sshd[39838]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:01 localhost krb5_child[39841]: Preauthentication failed Jan 23 03:41:01 localhost krb5_child[39841]: Preauthentication failed Jan 23 03:41:03 localhost sshd[39843]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:04 localhost krb5_child[39846]: Preauthentication failed Jan 23 03:41:04 localhost krb5_child[39846]: Preauthentication failed Jan 23 03:41:06 localhost sshd[39847]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:07 localhost krb5_child[39850]: Preauthentication failed Jan 23 03:41:07 localhost krb5_child[39850]: Preauthentication failed Jan 23 03:41:12 localhost sshd[39851]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:13 localhost krb5_child[39854]: Preauthentication failed Jan 23 03:41:13 localhost krb5_child[39854]: Preauthentication failed Jan 23 03:41:15 localhost sshd[39855]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:16 localhost krb5_child[39858]: Client's credentials have been revoked Jan 23 03:41:16 localhost krb5_child[39858]: Client's credentials have been revoked Jan 23 03:41:18 localhost sshd[39859]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:19 localhost krb5_child[39862]: Client's credentials have been revoked Jan 23 03:41:19 localhost krb5_child[39862]: Client's credentials have been revoked Jan 23 03:41:23 localhost sshd[39863]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:24 localhost krb5_child[39866]: Client's credentials have been revoked Jan 23 03:41:24 localhost krb5_child[39866]: Client's credentials have been revoked Jan 23 03:41:28 localhost sshd[39867]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:29 localhost krb5_child[39870]: Client's credentials have been revoked Jan 23 03:41:29 localhost krb5_child[39870]: Client's credentials have been revoked Jan 23 03:41:31 localhost sshd[39871]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:32 localhost krb5_child[39874]: Client's credentials have been revoked Jan 23 03:41:32 localhost krb5_child[39874]: Client's credentials have been revoked Jan 23 03:41:35 localhost sshd[39875]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:35 localhost krb5_child[39878]: Client's credentials have been revoked Jan 23 03:41:35 localhost krb5_child[39878]: Client's credentials have been revoked Jan 23 03:41:38 localhost sshd[39879]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:38 localhost krb5_child[39882]: Client's credentials have been revoked Jan 23 03:41:38 localhost krb5_child[39882]: Client's credentials have been revoked Jan 23 03:41:43 localhost sshd[39883]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:44 localhost krb5_child[39886]: Client's credentials have been revoked Jan 23 03:41:44 localhost krb5_child[39886]: Client's credentials have been revoked Jan 23 03:41:46 localhost sshd[39887]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:47 localhost krb5_child[39890]: Client's credentials have been revoked Jan 23 03:41:47 localhost krb5_child[39890]: Client's credentials have been revoked Jan 23 03:41:49 localhost sshd[39891]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:50 localhost krb5_child[39894]: Client's credentials have been revoked Jan 23 03:41:50 localhost krb5_child[39894]: Client's credentials have been revoked Jan 23 03:41:54 localhost sshd[39895]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:41:55 localhost krb5_child[39898]: Client's credentials have been revoked Jan 23 03:41:55 localhost krb5_child[39898]: Client's credentials have been revoked Jan 23 03:41:59 localhost sshd[39899]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:00 localhost krb5_child[39902]: Client's credentials have been revoked Jan 23 03:42:00 localhost krb5_child[39902]: Client's credentials have been revoked Jan 23 03:42:06 localhost sshd[39903]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:06 localhost krb5_child[39906]: Client's credentials have been revoked Jan 23 03:42:06 localhost krb5_child[39906]: Client's credentials have been revoked Jan 23 03:42:09 localhost sshd[39907]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:10 localhost krb5_child[39910]: Client's credentials have been revoked Jan 23 03:42:10 localhost krb5_child[39910]: Client's credentials have been revoked Jan 23 03:42:12 localhost sshd[39911]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:13 localhost krb5_child[39914]: Client's credentials have been revoked Jan 23 03:42:13 localhost krb5_child[39914]: Client's credentials have been revoked Jan 23 03:42:15 localhost sshd[39915]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:16 localhost krb5_child[39918]: Client's credentials have been revoked Jan 23 03:42:16 localhost krb5_child[39918]: Client's credentials have been revoked Jan 23 03:42:21 localhost sshd[39919]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:21 localhost krb5_child[39922]: Client's credentials have been revoked Jan 23 03:42:21 localhost krb5_child[39922]: Client's credentials have been revoked Jan 23 03:42:24 localhost sshd[39923]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:25 localhost krb5_child[39926]: Client's credentials have been revoked Jan 23 03:42:25 localhost krb5_child[39926]: Client's credentials have been revoked Jan 23 03:42:27 localhost sshd[39927]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:28 localhost krb5_child[39930]: Client's credentials have been revoked Jan 23 03:42:28 localhost krb5_child[39930]: Client's credentials have been revoked Jan 23 03:42:32 localhost sshd[39931]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:33 localhost krb5_child[39934]: Client's credentials have been revoked Jan 23 03:42:33 localhost krb5_child[39934]: Client's credentials have been revoked Jan 23 03:42:35 localhost sshd[39935]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:36 localhost krb5_child[39938]: Client's credentials have been revoked Jan 23 03:42:36 localhost krb5_child[39938]: Client's credentials have been revoked Jan 23 03:42:38 localhost sshd[39939]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:39 localhost sshd[39941]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:39 localhost krb5_child[39943]: Client's credentials have been revoked Jan 23 03:42:39 localhost krb5_child[39943]: Client's credentials have been revoked Jan 23 03:42:43 localhost sshd[39944]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:44 localhost krb5_child[39947]: Client's credentials have been revoked Jan 23 03:42:44 localhost krb5_child[39947]: Client's credentials have been revoked Jan 23 03:42:49 localhost sshd[39948]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:50 localhost krb5_child[39951]: Client's credentials have been revoked Jan 23 03:42:50 localhost krb5_child[39951]: Client's credentials have been revoked Jan 23 03:42:54 localhost sshd[39952]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:42:55 localhost krb5_child[39955]: Client's credentials have been revoked Jan 23 03:42:55 localhost krb5_child[39955]: Client's credentials have been revoked Jan 23 03:42:59 localhost sshd[39956]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:00 localhost krb5_child[39959]: Client's credentials have been revoked Jan 23 03:43:00 localhost krb5_child[39959]: Client's credentials have been revoked Jan 23 03:43:04 localhost sshd[39960]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:05 localhost krb5_child[39963]: Client's credentials have been revoked Jan 23 03:43:05 localhost krb5_child[39963]: Client's credentials have been revoked Jan 23 03:43:09 localhost sshd[39964]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:10 localhost krb5_child[39967]: Client's credentials have been revoked Jan 23 03:43:10 localhost krb5_child[39967]: Client's credentials have been revoked Jan 23 03:43:12 localhost sshd[39968]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:13 localhost krb5_child[39971]: Client's credentials have been revoked Jan 23 03:43:13 localhost krb5_child[39971]: Client's credentials have been revoked Jan 23 03:43:18 localhost sshd[39972]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:18 localhost krb5_child[39975]: Client's credentials have been revoked Jan 23 03:43:18 localhost krb5_child[39975]: Client's credentials have been revoked Jan 23 03:43:21 localhost sshd[39976]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:21 localhost krb5_child[39979]: Client's credentials have been revoked Jan 23 03:43:21 localhost krb5_child[39979]: Client's credentials have been revoked Jan 23 03:43:24 localhost sshd[39980]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:25 localhost krb5_child[39983]: Client's credentials have been revoked Jan 23 03:43:25 localhost krb5_child[39983]: Client's credentials have been revoked Jan 23 03:43:27 localhost sshd[39984]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:27 localhost sshd[39985]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:29 localhost sshd[39987]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:30 localhost krb5_child[39990]: Client's credentials have been revoked Jan 23 03:43:30 localhost krb5_child[39990]: Client's credentials have been revoked Jan 23 03:43:32 localhost sshd[39991]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:33 localhost krb5_child[39994]: Client's credentials have been revoked Jan 23 03:43:33 localhost krb5_child[39994]: Client's credentials have been revoked Jan 23 03:43:35 localhost sshd[39995]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:36 localhost krb5_child[39998]: Client's credentials have been revoked Jan 23 03:43:36 localhost krb5_child[39998]: Client's credentials have been revoked Jan 23 03:43:40 localhost sshd[39999]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:41 localhost krb5_child[40002]: Client's credentials have been revoked Jan 23 03:43:41 localhost krb5_child[40002]: Client's credentials have been revoked Jan 23 03:43:45 localhost sshd[40003]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:47 localhost krb5_child[40006]: Client's credentials have been revoked Jan 23 03:43:47 localhost krb5_child[40006]: Client's credentials have been revoked Jan 23 03:43:51 localhost sshd[40007]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:52 localhost krb5_child[40010]: Client's credentials have been revoked Jan 23 03:43:52 localhost krb5_child[40010]: Client's credentials have been revoked Jan 23 03:43:54 localhost sshd[40011]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:43:55 localhost krb5_child[40014]: Client's credentials have been revoked Jan 23 03:43:55 localhost krb5_child[40014]: Client's credentials have been revoked Jan 23 03:43:59 localhost sshd[40015]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:00 localhost krb5_child[40018]: Client's credentials have been revoked Jan 23 03:44:00 localhost krb5_child[40018]: Client's credentials have been revoked Jan 23 03:44:05 localhost sshd[40019]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:06 localhost krb5_child[40022]: Client's credentials have been revoked Jan 23 03:44:06 localhost krb5_child[40022]: Client's credentials have been revoked Jan 23 03:44:08 localhost sshd[40023]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:09 localhost krb5_child[40026]: Client's credentials have been revoked Jan 23 03:44:09 localhost krb5_child[40026]: Client's credentials have been revoked Jan 23 03:44:13 localhost sshd[40027]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:14 localhost krb5_child[40030]: Client's credentials have been revoked Jan 23 03:44:14 localhost krb5_child[40030]: Client's credentials have been revoked Jan 23 03:44:18 localhost sshd[40031]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:19 localhost krb5_child[40034]: Client's credentials have been revoked Jan 23 03:44:19 localhost krb5_child[40034]: Client's credentials have been revoked Jan 23 03:44:23 localhost sshd[40035]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:24 localhost krb5_child[40038]: Client's credentials have been revoked Jan 23 03:44:24 localhost krb5_child[40038]: Client's credentials have been revoked Jan 23 03:44:26 localhost sshd[40039]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:27 localhost krb5_child[40042]: Client's credentials have been revoked Jan 23 03:44:27 localhost krb5_child[40042]: Client's credentials have been revoked Jan 23 03:44:29 localhost sshd[40043]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:30 localhost krb5_child[40046]: Client's credentials have been revoked Jan 23 03:44:30 localhost krb5_child[40046]: Client's credentials have been revoked Jan 23 03:44:35 localhost sshd[40047]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:36 localhost krb5_child[40050]: Client's credentials have been revoked Jan 23 03:44:36 localhost krb5_child[40050]: Client's credentials have been revoked Jan 23 03:44:40 localhost sshd[40051]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:41 localhost krb5_child[40054]: Client's credentials have been revoked Jan 23 03:44:41 localhost krb5_child[40054]: Client's credentials have been revoked Jan 23 03:44:45 localhost sshd[40055]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:46 localhost krb5_child[40058]: Client's credentials have been revoked Jan 23 03:44:46 localhost krb5_child[40058]: Client's credentials have been revoked Jan 23 03:44:48 localhost sshd[40059]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:50 localhost krb5_child[40062]: Client's credentials have been revoked Jan 23 03:44:50 localhost krb5_child[40062]: Client's credentials have been revoked Jan 23 03:44:54 localhost sshd[40063]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:44:54 localhost krb5_child[40066]: Client's credentials have been revoked Jan 23 03:44:54 localhost krb5_child[40066]: Client's credentials have been revoked Jan 23 03:44:59 localhost sshd[40067]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:00 localhost krb5_child[40070]: Client's credentials have been revoked Jan 23 03:45:00 localhost krb5_child[40070]: Client's credentials have been revoked Jan 23 03:45:04 localhost sshd[40071]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:05 localhost krb5_child[40074]: Client's credentials have been revoked Jan 23 03:45:05 localhost krb5_child[40074]: Client's credentials have been revoked Jan 23 03:45:09 localhost sshd[40075]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:10 localhost krb5_child[40078]: Client's credentials have been revoked Jan 23 03:45:10 localhost krb5_child[40078]: Client's credentials have been revoked Jan 23 03:45:12 localhost sshd[40079]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:13 localhost krb5_child[40082]: Client's credentials have been revoked Jan 23 03:45:13 localhost krb5_child[40082]: Client's credentials have been revoked Jan 23 03:45:17 localhost sshd[40083]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:18 localhost krb5_child[40086]: Client's credentials have been revoked Jan 23 03:45:18 localhost krb5_child[40086]: Client's credentials have been revoked Jan 23 03:45:23 localhost sshd[40087]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:23 localhost krb5_child[40090]: Client's credentials have been revoked Jan 23 03:45:23 localhost krb5_child[40090]: Client's credentials have been revoked Jan 23 03:45:26 localhost sshd[40091]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:27 localhost krb5_child[40094]: Client's credentials have been revoked Jan 23 03:45:27 localhost krb5_child[40094]: Client's credentials have been revoked Jan 23 03:45:31 localhost sshd[40095]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:32 localhost krb5_child[40098]: Client's credentials have been revoked Jan 23 03:45:32 localhost krb5_child[40098]: Client's credentials have been revoked Jan 23 03:45:36 localhost sshd[40099]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:37 localhost krb5_child[40102]: Client's credentials have been revoked Jan 23 03:45:37 localhost krb5_child[40102]: Client's credentials have been revoked Jan 23 03:45:41 localhost sshd[40103]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:42 localhost krb5_child[40106]: Client's credentials have been revoked Jan 23 03:45:42 localhost krb5_child[40106]: Client's credentials have been revoked Jan 23 03:45:44 localhost sshd[40107]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:45 localhost krb5_child[40110]: Client's credentials have been revoked Jan 23 03:45:45 localhost krb5_child[40110]: Client's credentials have been revoked Jan 23 03:45:47 localhost sshd[40111]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:48 localhost krb5_child[40114]: Client's credentials have been revoked Jan 23 03:45:48 localhost krb5_child[40114]: Client's credentials have been revoked Jan 23 03:45:53 localhost sshd[40115]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:53 localhost krb5_child[40119]: Client's credentials have been revoked Jan 23 03:45:53 localhost krb5_child[40119]: Client's credentials have been revoked Jan 23 03:45:56 localhost sshd[40120]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:45:57 localhost krb5_child[40123]: Client's credentials have been revoked Jan 23 03:45:57 localhost krb5_child[40123]: Client's credentials have been revoked Jan 23 03:46:01 localhost sshd[40124]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:02 localhost krb5_child[40127]: Client's credentials have been revoked Jan 23 03:46:02 localhost krb5_child[40127]: Client's credentials have been revoked Jan 23 03:46:06 localhost sshd[40128]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:07 localhost krb5_child[40131]: Client's credentials have been revoked Jan 23 03:46:07 localhost krb5_child[40131]: Client's credentials have been revoked Jan 23 03:46:11 localhost sshd[40132]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:12 localhost krb5_child[40135]: Client's credentials have been revoked Jan 23 03:46:12 localhost krb5_child[40135]: Client's credentials have been revoked Jan 23 03:46:16 localhost sshd[40136]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:17 localhost krb5_child[40139]: Client's credentials have been revoked Jan 23 03:46:17 localhost krb5_child[40139]: Client's credentials have been revoked Jan 23 03:46:21 localhost sshd[40140]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:22 localhost krb5_child[40143]: Client's credentials have been revoked Jan 23 03:46:22 localhost krb5_child[40143]: Client's credentials have been revoked Jan 23 03:46:25 localhost sshd[40144]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:26 localhost krb5_child[40147]: Client's credentials have been revoked Jan 23 03:46:26 localhost krb5_child[40147]: Client's credentials have been revoked Jan 23 03:46:30 localhost sshd[40148]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:31 localhost krb5_child[40151]: Client's credentials have been revoked Jan 23 03:46:31 localhost krb5_child[40151]: Client's credentials have been revoked Jan 23 03:46:33 localhost sshd[40152]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:34 localhost krb5_child[40155]: Client's credentials have been revoked Jan 23 03:46:34 localhost krb5_child[40155]: Client's credentials have been revoked Jan 23 03:46:36 localhost sshd[40156]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:37 localhost krb5_child[40159]: Client's credentials have been revoked Jan 23 03:46:37 localhost krb5_child[40159]: Client's credentials have been revoked Jan 23 03:46:41 localhost sshd[40160]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:42 localhost krb5_child[40163]: Client's credentials have been revoked Jan 23 03:46:42 localhost krb5_child[40163]: Client's credentials have been revoked Jan 23 03:46:44 localhost sshd[40164]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:45 localhost krb5_child[40167]: Client's credentials have been revoked Jan 23 03:46:45 localhost krb5_child[40167]: Client's credentials have been revoked Jan 23 03:46:47 localhost sshd[40168]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:46:52 localhost sshd[40170]: main: sshd: ssh-rsa algorithm is disabled Jan 23 03:57:35 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=c6:e7:bc:23:0b:06 MACDST=fa:16:3e:26:d9:ab MACPROTO=0800 SRC=100.29.192.5 DST=38.102.83.236 LEN=44 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=19965 DPT=9090 SEQ=0 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B4) Jan 23 04:11:27 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:26:d9:ab MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.236 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=13276 DF PROTO=TCP SPT=40652 DPT=19885 SEQ=624715701 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A1CB45E650000000001030307) Jan 23 04:11:28 localhost sshd[40192]: main: sshd: ssh-rsa algorithm is disabled Jan 23 04:11:28 localhost systemd[1]: Starting User Manager for UID 1000... Jan 23 04:11:28 localhost systemd-logind[35752]: New session 17 of user zuul. Jan 23 04:11:28 localhost systemd[40196]: Queued start job for default target Main User Target. Jan 23 04:11:28 localhost systemd[40196]: Created slice User Application Slice. Jan 23 04:11:28 localhost systemd[40196]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 04:11:28 localhost systemd[40196]: Started Daily Cleanup of User's Temporary Directories. Jan 23 04:11:28 localhost systemd[40196]: Reached target Paths. Jan 23 04:11:28 localhost systemd[40196]: Reached target Timers. Jan 23 04:11:28 localhost systemd[40196]: Starting D-Bus User Message Bus Socket... Jan 23 04:11:28 localhost systemd[40196]: Starting Create User's Volatile Files and Directories... Jan 23 04:11:28 localhost systemd[40196]: Finished Create User's Volatile Files and Directories. Jan 23 04:11:28 localhost systemd[40196]: Listening on D-Bus User Message Bus Socket. Jan 23 04:11:28 localhost systemd[40196]: Reached target Sockets. Jan 23 04:11:28 localhost systemd[40196]: Reached target Basic System. Jan 23 04:11:28 localhost systemd[40196]: Reached target Main User Target. Jan 23 04:11:28 localhost systemd[40196]: Startup finished in 112ms. Jan 23 04:11:28 localhost systemd[1]: Started User Manager for UID 1000. Jan 23 04:11:28 localhost systemd[1]: Started Session 17 of User zuul. Jan 23 04:11:28 localhost python3[40227]: ansible-ansible.legacy.command Invoked with _raw_params=subscription-manager unregister#012 _uses_shell=True zuul_log_id=fa163ec2-ffbe-8619-8585-00000000000c-1-overcloudcontroller0 zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Jan 23 04:11:29 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:26:d9:ab MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.236 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=13277 DF PROTO=TCP SPT=40652 DPT=19885 SEQ=624715701 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A1CB4627A0000000001030307) Jan 23 04:11:29 localhost subscription-manager[40228]: Unregistered machine with identity: 037813df-37fe-49a1-bb66-068f76544ff4 Jan 23 04:11:31 localhost kernel: DROPPING: IN=eth0 OUT= MACSRC=fa:16:3e:77:13:69 MACDST=fa:16:3e:26:d9:ab MACPROTO=0800 SRC=38.102.83.114 DST=38.102.83.236 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=13278 DF PROTO=TCP SPT=40652 DPT=19885 SEQ=624715701 ACK=0 WINDOW=32120 RES=0x00 SYN URGP=0 OPT (020405B40402080A1CB46A7A0000000001030307) Jan 23 04:11:34 localhost systemd[1]: session-17.scope: Deactivated successfully. Jan 23 04:11:34 localhost systemd-logind[35752]: Session 17 logged out. Waiting for processes to exit. Jan 23 04:11:34 localhost systemd-logind[35752]: Removed session 17. Jan 23 04:11:44 localhost systemd[1]: Stopping User Manager for UID 1000... Jan 23 04:11:44 localhost systemd[40196]: Activating special unit Exit the Session... Jan 23 04:11:44 localhost systemd[40196]: Stopped target Main User Target. Jan 23 04:11:44 localhost systemd[40196]: Stopped target Basic System. Jan 23 04:11:44 localhost systemd[40196]: Stopped target Paths. Jan 23 04:11:44 localhost systemd[40196]: Stopped target Sockets. Jan 23 04:11:44 localhost systemd[40196]: Stopped target Timers. Jan 23 04:11:44 localhost systemd[40196]: Stopped Mark boot as successful after the user session has run 2 minutes. Jan 23 04:11:44 localhost systemd[40196]: Stopped Daily Cleanup of User's Temporary Directories. Jan 23 04:11:44 localhost systemd[40196]: Closed D-Bus User Message Bus Socket. Jan 23 04:11:44 localhost systemd[40196]: Stopped Create User's Volatile Files and Directories. Jan 23 04:11:44 localhost systemd[40196]: Removed slice User Application Slice. Jan 23 04:11:44 localhost systemd[40196]: Reached target Shutdown. Jan 23 04:11:44 localhost systemd[40196]: Finished Exit the Session. Jan 23 04:11:44 localhost systemd[40196]: Reached target Exit the Session. Jan 23 04:11:44 localhost systemd[1]: user@1000.service: Deactivated successfully. Jan 23 04:11:44 localhost systemd[1]: Stopped User Manager for UID 1000. Jan 23 04:11:46 localhost sshd[40232]: main: sshd: ssh-rsa algorithm is disabled Jan 23 04:11:46 localhost systemd[1]: Starting User Manager for UID 1000... Jan 23 04:11:46 localhost systemd-logind[35752]: New session 19 of user zuul. Jan 23 04:11:46 localhost systemd[40236]: Queued start job for default target Main User Target. Jan 23 04:11:46 localhost systemd[40236]: Created slice User Application Slice. Jan 23 04:11:46 localhost systemd[40236]: Started Mark boot as successful after the user session has run 2 minutes. Jan 23 04:11:46 localhost systemd[40236]: Started Daily Cleanup of User's Temporary Directories. Jan 23 04:11:46 localhost systemd[40236]: Reached target Paths. Jan 23 04:11:46 localhost systemd[40236]: Reached target Timers.