Last policy updates remove root access to Killswitch status. That causes some programs (which run as root) to be unable to query killswitch. Jun 12 20:36:32 [dbus-daemon] Rejected send message, 1 matched rules; type="method_call", sender=":1.8" (uid=0 pid=25269 comm="/usr/sbin/NetworkManager --pid-file /var/run/Netwo") interface="org.freedesktop.Hal.Device.KillSwitch" member="GetPower" error name="(unset)" requested_reply=0 destination="org.freedesktop.Hal" (uid=0 pid=25172 comm="/usr/sbin/hald --use-syslog --verbose=no ")) Reproducible: Always
I can acknowledge this issue, happening with my system too: Jun 25 11:27:52 falcon dbus-daemon: Rejected send message, 1 matched rules; type="method_call", sender=":1.7" (uid=0 pid=2809 comm="/usr/sbin/NetworkManager --pid-file /var/run/Netwo") interface="org.freedesktop.Hal.Device.KillSwitch" member="GetPower" error name="(unset)" requested_reply=0 destination="org.freedesktop.Hal" (uid=0 pid=2740 comm="/usr/sbin/hald --use-syslog --verbose=no "))
Same here: Jul 2 17:27:01 yellow dbus-daemon: Rejected send message, 1 matched rules; type="method_call", sender=":1.7" (uid=0 pid=14993 comm="/usr/sbin/NetworkManager --pid-file /var/run/Netwo") interface="org.freedesktop.Hal.Device.KillSwitch" member="GetPower" error name="(unset)" requested_reply=0 destination="org.freedesktop.Hal" (uid=0 pid=14859 comm="/usr/sbin/hald --use-syslog --verbose=no ")) Reproducibel: Always
Same for me here. I have it too : Jun 29 04:23:23 pluton dbus-daemon: Rejected send message, 1 matched rules; type="method_call", sender=":1.7" (uid=0 pid=2108 comm="/usr/sbin/NetworkManager --pid-file /var/run/Netwo") interface="org.freedesktop.Hal.Device.KillSwitch" member="GetPower" error name="(unset)" requested_reply=0 destination="org.freedesktop.Hal" (uid=0 pid=1977 comm="/usr/sbin/hald --use-syslog --verbose=no "))
This message is flooding /var/log/messages every 6 seconds... This greatly increase the size of the messages file.
Okay, I've added -r7 that allows root access to killswitch.