System Information
SysInfo    : kjc386-6
     02:33:08 up 54 days, 10:57,  6 users,  load average: 2.10, 2.27, 2.29

OS	: Linux 4.1.13-100.fc21.x86_64
RAM	: 3952 MB (approx.)
Swap	: 10247 MB (approx.)

     #               Uptime | System                                     Boot up
----------------------------+---------------------------------------------------
     1   193 days, 04:17:56 | Linux 2.6.35.14-106.fc14  Thu Dec 22 11:54:02 2011
     2   189 days, 23:02:42 | Linux 2.6.30.10-105.2.23  Wed May  5 01:20:15 2010
     3   183 days, 11:11:33 | Linux 4.1.13-100.fc21.x8  Tue Sep 13 15:45:53 2016
     4   170 days, 00:10:05 | Linux 3.14.27-100.fc19.x  Tue Feb 10 16:13:57 2015
     5   164 days, 22:41:43 | Linux 3.19.8-100.fc20.x8  Thu Jul 30 19:51:03 2015
     6   161 days, 17:21:32 | Linux 3.19.8-100.fc20.x8  Sun Apr  3 19:26:00 2016
     7   148 days, 14:34:37 | Linux 2.6.35.14-106.fc14  Wed Oct 31 19:48:10 2012
     8   131 days, 13:04:56 | Linux 2.6.24.7-92.fc8     Thu Jun 26 10:41:21 2008
     9   125 days, 12:48:16 | Linux 2.6.23.14-107.fc8   Sun Nov 25 17:53:05 2007
    10   110 days, 20:40:12 | Linux 2.6.15-1.1826.2.10  Sun Jan 15 21:59:25 2006
----------------------------+---------------------------------------------------
->  26    54 days, 10:57:42 | Linux 4.1.13-100.fc21.x8  Tue May 30 15:35:26 2017
----------------------------+---------------------------------------------------
1up in     4 days, 15:27:06 | at                        Fri Jul 28 18:00:13 2017
t10 in    56 days, 09:42:31 | at                        Mon Sep 18 12:15:38 2017
no1 in   138 days, 17:20:15 | at                        Sat Dec  9 18:53:22 2017
    up  3754 days, 09:21:21 | since                     Wed Mar  5 19:08:14 2003
  down  1499 days, 21:03:33 | since                     Wed Mar  5 19:08:14 2003
   %up               71.454 | since                     Wed Mar  5 19:08:14 2003

       Drive Information
Filesystem Mount Use Used Avail Size
/dev/sdb8 / 8% 51,991,020K 641,377,960K 730,499,304K
devtmpfs /dev 0% 0K 2,014,248K 2,014,248K
tmpfs /dev/shm 1% 268K 2,023,252K 2,023,520K
tmpfs /sys/fs/cgroup 0% 0K 2,023,520K 2,023,520K
tmpfs /run 1% 1,388K 2,022,132K 2,023,520K
tmpfs /tmp 1% 136K 2,023,384K 2,023,520K
/dev/sda2 /iso 84% 187,994,624K 38,053,936K 238,153,132K
/dev/sdb5 /home 58% 66,646,140K 49,994,440K 122,906,964K
/dev/sdb6 /local 9% 2,347,416K 26,702,068K 30,628,368K
/dev/sdb2 /boot 5% 151,536K 3,619,744K 3,997,376K
/dev/sdb7 /src 23% 12,897,056K 45,349,516K 61,387,956K
tmpfs /tmp 1% 136K 2,023,384K 2,023,520K
tmpfs /run/user/1630 1% 28K 404,680K 404,708K
tmpfs /run/user/0 0% 0K 404,708K 404,708K
tmpfs /run/user/494 0% 0K 404,708K 404,708K

       Who, What, When

 02:33:09 up 54 days, 10:57,  6 users,  load average: 2.10, 2.27, 2.29
 USER     TTY        LOGIN@   IDLE   JCPU   PCPU WHAT
 cummings :0        30May17 ?xdm?   3days 32.26s mate-session
 cummings pts/0     30May17 18days  5:05m  0.01s bash
 root     pts/1     30May17 54days  0.07s  0.06s -bash
 cummings pts/2     30May17 18days  0.13s  3.47s mate-terminal
 root     tty2      07Jul17 16days  2:12m  2:12m top
 cummings tty3      08Jul17 16days 19:28m  0.13s -bash

       Resource Information
  PID USER      PR  NI    VIRT    RES    SHR S  %CPU %MEM     TIME+ COMMAND
  9496 setroub+  20   0  353268  61000  17380 R  85.0  1.5   0:00.61 setroubles+
 29504 boinc     39  19   59732  55544   1032 R  85.0  1.4 200:27.23 setiathome+
 31857 boinc     39  19   59732  55628   1108 R  85.0  1.4 153:04.98 setiathome+
   632 root      16  -4  114600    480    332 S   5.0  0.0   0:52.53 auditd
   640 root      12  -8   80212    332    244 S   5.0  0.0   0:34.98 audispd
  9518 root      20   0   42852   3296   2648 R   5.0  0.1   0:00.03 top
     1 root      20   0  202028  18620   2724 S   0.0  0.5  34:08.82 systemd
     2 root      20   0       0      0      0 S   0.0  0.0   0:20.49 kthreadd
     3 root      20   0       0      0      0 S   0.0  0.0   1:28.33 ksoftirqd/0
     5 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 kworker/0:+
     7 root      20   0       0      0      0 S   0.0  0.0  50:36.71 rcu_sched
     8 root      20   0       0      0      0 S   0.0  0.0   0:00.00 rcu_bh
     9 root      20   0       0      0      0 S   0.0  0.0  31:42.82 rcuos/0
    10 root      20   0       0      0      0 S   0.0  0.0   0:00.00 rcuob/0
    11 root      rt   0       0      0      0 S   0.0  0.0   0:17.20 migration/0
    12 root      rt   0       0      0      0 S   0.0  0.0   0:15.06 watchdog/0
    13 root      rt   0       0      0      0 S   0.0  0.0   0:13.39 watchdog/1
    14 root      rt   0       0      0      0 S   0.0  0.0   0:17.20 migration/1
    15 root      20   0       0      0      0 S   0.0  0.0   0:08.70 ksoftirqd/1
    17 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 kworker/1:+
    18 root      20   0       0      0      0 S   0.0  0.0  11:40.64 rcuos/1
    19 root      20   0       0      0      0 S   0.0  0.0   0:00.00 rcuob/1
    20 root      rt   0       0      0      0 S   0.0  0.0   0:12.26 watchdog/2
    21 root      rt   0       0      0      0 S   0.0  0.0   0:15.70 migration/2
    22 root      20   0       0      0      0 S   0.0  0.0   0:26.30 ksoftirqd/2
    24 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 kworker/2:+
    25 root      20   0       0      0      0 S   0.0  0.0  18:24.11 rcuos/2
    26 root      20   0       0      0      0 S   0.0  0.0   0:00.00 rcuob/2
    27 root      rt   0       0      0      0 S   0.0  0.0   0:12.56 watchdog/3
    28 root      rt   0       0      0      0 S   0.0  0.0   0:17.18 migration/3
    29 root      20   0       0      0      0 S   0.0  0.0   1:26.25 ksoftirqd/3
    31 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 kworker/3:+
    32 root      20   0       0      0      0 S   0.0  0.0   9:40.56 rcuos/3
    33 root      20   0       0      0      0 S   0.0  0.0   0:00.00 rcuob/3
    34 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 khelper
    35 root      20   0       0      0      0 S   0.0  0.0   0:00.00 kdevtmpfs
    36 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 netns
    37 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 perf
    38 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 writeback
    39 root      25   5       0      0      0 S   0.0  0.0   0:00.00 ksmd
    40 root      39  19       0      0      0 S   0.0  0.0   0:00.00 khugepaged
    41 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 crypto
    42 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 kintegrityd
    43 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 bioset
    44 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 kblockd
    45 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 ata_sff
    46 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 md
    47 root       0 -20       0      0      0 S   0.0  0.0   0:00.00 devfreq_wq
    53 root      20   0       0      0      0 S   0.0  0.0  33:43.75 kswapd0
    54 root      20   0       0      0      0 S   0.0  0.0   1:09.39 fsnotify_m+

       System Messages

 You can generate a local policy module to allow this access.
 Do
 allow this access for now by executing:
 # grep cat /var/log/audit/audit.log | audit2allow -M mypol
 # semodule -i mypol.pp
 
 
 Jul 24 02:31:58 kjchome setroubleshoot: could not write /var/lib/setroubleshoot/setroubleshoot_database.xml: [Errno 13] Permission denied: '/var/lib/setroubleshoot/setroubleshoot_database.xml'
 Jul 24 02:32:18 kjchome ownCloud[14523]: {PHP} Declaration of OC_Connector_Sabre_Server::checkPreconditions() should be compatible with Sabre\DAV\Server::checkPreconditions(Sabre\HTTP\RequestInterface $request, Sabre\HTTP\ResponseInterface $response) at /usr/share/owncloud/lib/private/connector/sabre/server.php#29
 Jul 24 02:32:18 kjchome httpd[14523]: {PHP} Call to undefined method OC_Connector_Sabre_Server::subscribeEvent() at /usr/share/owncloud/lib/private/connector/sabre/filesplugin.php#45
 Jul 24 02:32:50 kjchome ownCloud[19834]: {PHP} Declaration of OC_Connector_Sabre_Server::checkPreconditions() should be compatible with Sabre\DAV\Server::checkPreconditions(Sabre\HTTP\RequestInterface $request, Sabre\HTTP\ResponseInterface $response) at /usr/share/owncloud/lib/private/connector/sabre/server.php#29
 Jul 24 02:32:50 kjchome httpd[19834]: {PHP} Call to undefined method OC_Connector_Sabre_Server::subscribeEvent() at /usr/share/owncloud/lib/private/connector/sabre/filesplugin.php#45
 Jul 24 02:33:08 kjchome dbus[747]: [system] Activating service name='org.fedoraproject.Setroubleshootd' (using servicehelper)
 Jul 24 02:33:08 kjchome dbus[747]: [system] Successfully activated service 'org.fedoraproject.Setroubleshootd'
 Jul 24 02:33:08 kjchome setroubleshoot: cannot chmod /var/lib/setroubleshoot/setroubleshoot_database.xml to 600 [Operation not permitted]
 Jul 24 02:33:08 kjchome setroubleshoot: cannot chown /var/lib/setroubleshoot/setroubleshoot_database.xml to setroubleshoot:setroubleshoot [Operation not permitted]
 Jul 24 02:33:08 kjchome setroubleshoot: read_xml_file() libxml2.parserError: xmlParseFile() failed
 Jul 24 02:33:08 kjchome org.fedoraproject.Setroubleshootd: Permission deniedPermission deniedI/O warning : failed to load external entity "/var/lib/setroubleshoot/setroubleshoot_database.xml"
 Jul 24 02:33:08 kjchome setroubleshoot: cannot chmod /var/lib/setroubleshoot/email_alert_recipients to 600 [Operation not permitted]
 Jul 24 02:33:08 kjchome setroubleshoot: cannot chown /var/lib/setroubleshoot/email_alert_recipients to setroubleshoot:setroubleshoot [Operation not permitted]


Output produced by SysWatch 1.5.1